comped9 module 5 security and ethics
TRANSCRIPT
COMPUTER EDUCATION 9
MODULE 5Security and Ethics
Prepared By: Engr. Jeremy M. Flores
TEN COMPUTER ETHICS
(1)Thou shall not use
computer to harm other people.
TEN COMPUTER ETHICS
(2)Thou shall not interfere
with other people’s computer work.
TEN COMPUTER ETHICS
(3)Thou shall not snoop
around in other people’s files.
TEN COMPUTER ETHICS
(4)Thou shall not use a computer to steal.
TEN COMPUTER ETHICS
(5)Thou shall not use a
computer to bear false witness.
TEN COMPUTER ETHICS
(6)Thou shall not use or copy
software for which you have not paid.
TEN COMPUTER ETHICS
(7)Thou shall not use other
people’s computer resources without
authorization.
TEN COMPUTER ETHICS
(8)Thou shall not appropriate other people’s intellectual
output.
TEN COMPUTER ETHICS
(9)Thou shall think about the
social consequences of the program you write.
TEN COMPUTER ETHICS
(10)Thou shall use a computer
in ways that shows consideration and respect.
MALWARE
Malicious Software
A code or software that is specifically designed to
damage, disrupt, steal, or in general, inflict some other
“bad” or illegitimate action on data, hosts, or networks.
MALWARE
Malicious Software
Malware cannot damage the physical components of
computer systems and network equipment, but it can damage the data and software residing
on the equipment.
TYPES OF MALWARE
ADWARE (Advertising-supported Software)
A software or program that automatically delivers
advertisements, such as pop-up ads on websites, and some serves
as revenue generating tool.
TYPES OF MALWARE
BOT or BOTNET
A software or program created to automatically perform
specific operations. Some are created for relatively harmless purpose, while most are used
for DoS attacks.
TYPES OF MALWARE
RANSOMWARE
A software or program that essentially holds a computer
system captive, such as restricting user access to the computer, while demanding a
ransom.
TYPES OF MALWARE
ROOTKIT
A software or program designed to remotely access
or control a computer without being detected by
users or security programs.
TYPES OF MALWARE
SPYWARE
A software or program that functions by spying on user
activity without their knowledge, such as activity monitoring, collecting keystrokes, data
harvesting, and the like.
TYPES OF MALWARE
TROJAN HORSE
A software or program that disguises itself as a normal
file or program to trick users into copying, downloading,
and installing malware.
TYPES OF MALWARE
VIRUS
A software or program that is capable of copying itself and spreading to other computers
by attaching themselves to various programs and
executable files.
TYPES OF MALWARE
COMPUTER WORM
A software or program that spreads over computer networks by exploiting computer system vulnerabilities, and have the ability to self-replicate and
spread independently.
TYPES OF MALWARE
KEYLOGGER
A software or program that records keystrokes to steal
information, such as a password.
TYPES OF MALWARE
LOGIC BOMB
A software or program that sits dormant on a computer
until it is triggered by a specific event, such as specific date or time.
TOP DEVELOPERS OF MALWARE
United States of AmericaChina
Germany
7th to 10th Rank: Philippines
AVERAGE MALWARE INFECTION
ONE COMPUTER FOR EVERY TWO
MINUTES INTERVAL.
SYMPTOMS OF MALWARE
Increase CPU usage.Slow computer or web browser
speeds.Problems connecting to networks.
Freezing or crashing.Modified or deleted files.
SYMPTOMS OF MALWARE
Appearance of strange files, programs, or icons.
Programs running, turning off, or reconfiguring themselves.
Emails being sent automatically.Strange computer behaviors.
PREVENTION AND REMOVAL
Install and run anti-malware and firewall software. Choose a
program that offers tools for detecting, quarantining, and removing multiple types of
malware. A combination of an anti-malware software and a firewall will ensure safety.
PREVENTION AND REMOVAL
Keep software and operating systems up to date with current
vulnerability patches for bugs and security flaws that could be
exploited by attackers.
PREVENTION AND REMOVAL
“HIGHLY IMPORTANT”
Be vigilant when copying and downloading files,
programs, attachments, and the like.