COMPED9 Module 5 Security and Ethics
out of 30
Post on 19-Aug-2015
- 1. COMPUTER EDUCATION 9 MODULE 5 Security and Ethics Prepared By: Engr. Jeremy M. Flores
- 2. TEN COMPUTER ETHICS (1) Thou shall not use computer to harm other people.
- 3. TEN COMPUTER ETHICS (2) Thou shall not interfere with other peoples computer work.
- 4. TEN COMPUTER ETHICS (3) Thou shall not snoop around in other peoples files.
- 5. TEN COMPUTER ETHICS (4) Thou shall not use a computer to steal.
- 6. TEN COMPUTER ETHICS (5) Thou shall not use a computer to bear false witness.
- 7. TEN COMPUTER ETHICS (6) Thou shall not use or copy software for which you have not paid.
- 8. TEN COMPUTER ETHICS (7) Thou shall not use other peoples computer resources without authorization.
- 9. TEN COMPUTER ETHICS (8) Thou shall not appropriate other peoples intellectual output.
- 10. TEN COMPUTER ETHICS (9) Thou shall think about the social consequences of the program you write.
- 11. TEN COMPUTER ETHICS (10) Thou shall use a computer in ways that shows consideration and respect.
- 12. MALWARE Malicious Software A code or software that is specifically designed to damage, disrupt, steal, or in general, inflict some other bad or illegitimate action on data, hosts, or networks.
- 13. MALWARE Malicious Software Malware cannot damage the physical components of computer systems and network equipment, but it can damage the data and software residing on the equipment.
- 14. TYPES OF MALWARE ADWARE (Advertising-supported Software) A software or program that automatically delivers advertisements, such as pop-up ads on websites, and some serves as revenue generating tool.
- 15. TYPES OF MALWARE BOT or BOTNET A software or program created to automatically perform specific operations. Some are created for relatively harmless purpose, while most are used for DoS attacks.
- 16. TYPES OF MALWARE RANSOMWARE A software or program that essentially holds a computer system captive, such as restricting user access to the computer, while demanding a ransom.
- 17. TYPES OF MALWARE ROOTKIT A software or program designed to remotely access or control a computer without being detected by users or security programs.
- 18. TYPES OF MALWARE SPYWARE A software or program that functions by spying on user activity without their knowledge, such as activity monitoring, collecting keystrokes, data harvesting, and the like.
- 19. TYPES OF MALWARE TROJAN HORSE A software or program that disguises itself as a normal file or program to trick users into copying, downloading, and installing malware.
- 20. TYPES OF MALWARE VIRUS A software or program that is capable of copying itself and spreading to other computers by attaching themselves to various programs and executable files.
- 21. TYPES OF MALWARE COMPUTER WORM A software or program that spreads over computer networks by exploiting computer system vulnerabilities, and have the ability to self-replicate and spread independently.
- 22. TYPES OF MALWARE KEYLOGGER A software or program that records keystrokes to steal information, such as a password.
- 23. TYPES OF MALWARE LOGIC BOMB A software or program that sits dormant on a computer until it is triggered by a specific event, such as specific date or time.
- 24. TOP DEVELOPERS OF MALWARE United States of America China Germany 7th to 10th Rank: Philippines
- 25. AVERAGE MALWARE INFECTION ONE COMPUTER FOR EVERY TWO MINUTES INTERVAL.
- 26. SYMPTOMS OF MALWARE Increase CPU usage. Slow computer or web browser speeds. Problems connecting to networks. Freezing or crashing. Modified or deleted files.
- 27. SYMPTOMS OF MALWARE Appearance of strange files, programs, or icons. Programs running, turning off, or reconfiguring themselves. Emails being sent automatically. Strange computer behaviors.
- 28. PREVENTION AND REMOVAL Install and run anti-malware and firewall software. Choose a program that offers tools for detecting, quarantining, and removing multiple types of malware. A combination of an anti-malware software and a firewall will ensure safety.
- 29. PREVENTION AND REMOVAL Keep software and operating systems up to date with current vulnerability patches for bugs and security flaws that could be exploited by attackers.
- 30. PREVENTION AND REMOVAL HIGHLY IMPORTANT Be vigilant when copying and downloading files, programs, attachments, and the like.
View more >
CAMPUS SECURITY OFFICER PROGRAM - Improving SECURITY OFFICER PROGRAM CSO Training Module I II Student Guide 4 B. Campus Security Officer Professionalism and Ethics Reading: Campus Security Officer (CSO) Professionalism and Ethics