COMPED9 Module 5 Security and Ethics

Download COMPED9 Module 5 Security and Ethics

Post on 19-Aug-2015

12 views

Category:

Education

0 download

TRANSCRIPT

  1. 1. COMPUTER EDUCATION 9 MODULE 5 Security and Ethics Prepared By: Engr. Jeremy M. Flores
  2. 2. TEN COMPUTER ETHICS (1) Thou shall not use computer to harm other people.
  3. 3. TEN COMPUTER ETHICS (2) Thou shall not interfere with other peoples computer work.
  4. 4. TEN COMPUTER ETHICS (3) Thou shall not snoop around in other peoples files.
  5. 5. TEN COMPUTER ETHICS (4) Thou shall not use a computer to steal.
  6. 6. TEN COMPUTER ETHICS (5) Thou shall not use a computer to bear false witness.
  7. 7. TEN COMPUTER ETHICS (6) Thou shall not use or copy software for which you have not paid.
  8. 8. TEN COMPUTER ETHICS (7) Thou shall not use other peoples computer resources without authorization.
  9. 9. TEN COMPUTER ETHICS (8) Thou shall not appropriate other peoples intellectual output.
  10. 10. TEN COMPUTER ETHICS (9) Thou shall think about the social consequences of the program you write.
  11. 11. TEN COMPUTER ETHICS (10) Thou shall use a computer in ways that shows consideration and respect.
  12. 12. MALWARE Malicious Software A code or software that is specifically designed to damage, disrupt, steal, or in general, inflict some other bad or illegitimate action on data, hosts, or networks.
  13. 13. MALWARE Malicious Software Malware cannot damage the physical components of computer systems and network equipment, but it can damage the data and software residing on the equipment.
  14. 14. TYPES OF MALWARE ADWARE (Advertising-supported Software) A software or program that automatically delivers advertisements, such as pop-up ads on websites, and some serves as revenue generating tool.
  15. 15. TYPES OF MALWARE BOT or BOTNET A software or program created to automatically perform specific operations. Some are created for relatively harmless purpose, while most are used for DoS attacks.
  16. 16. TYPES OF MALWARE RANSOMWARE A software or program that essentially holds a computer system captive, such as restricting user access to the computer, while demanding a ransom.
  17. 17. TYPES OF MALWARE ROOTKIT A software or program designed to remotely access or control a computer without being detected by users or security programs.
  18. 18. TYPES OF MALWARE SPYWARE A software or program that functions by spying on user activity without their knowledge, such as activity monitoring, collecting keystrokes, data harvesting, and the like.
  19. 19. TYPES OF MALWARE TROJAN HORSE A software or program that disguises itself as a normal file or program to trick users into copying, downloading, and installing malware.
  20. 20. TYPES OF MALWARE VIRUS A software or program that is capable of copying itself and spreading to other computers by attaching themselves to various programs and executable files.
  21. 21. TYPES OF MALWARE COMPUTER WORM A software or program that spreads over computer networks by exploiting computer system vulnerabilities, and have the ability to self-replicate and spread independently.
  22. 22. TYPES OF MALWARE KEYLOGGER A software or program that records keystrokes to steal information, such as a password.
  23. 23. TYPES OF MALWARE LOGIC BOMB A software or program that sits dormant on a computer until it is triggered by a specific event, such as specific date or time.
  24. 24. TOP DEVELOPERS OF MALWARE United States of America China Germany 7th to 10th Rank: Philippines
  25. 25. AVERAGE MALWARE INFECTION ONE COMPUTER FOR EVERY TWO MINUTES INTERVAL.
  26. 26. SYMPTOMS OF MALWARE Increase CPU usage. Slow computer or web browser speeds. Problems connecting to networks. Freezing or crashing. Modified or deleted files.
  27. 27. SYMPTOMS OF MALWARE Appearance of strange files, programs, or icons. Programs running, turning off, or reconfiguring themselves. Emails being sent automatically. Strange computer behaviors.
  28. 28. PREVENTION AND REMOVAL Install and run anti-malware and firewall software. Choose a program that offers tools for detecting, quarantining, and removing multiple types of malware. A combination of an anti-malware software and a firewall will ensure safety.
  29. 29. PREVENTION AND REMOVAL Keep software and operating systems up to date with current vulnerability patches for bugs and security flaws that could be exploited by attackers.
  30. 30. PREVENTION AND REMOVAL HIGHLY IMPORTANT Be vigilant when copying and downloading files, programs, attachments, and the like.