comped9 module 5 security and ethics

30
COMPUTER EDUCATION 9 MODULE 5 Security and Ethics Prepared By: Engr. Jeremy M. Flores

Upload: jeremy-flores

Post on 19-Aug-2015

16 views

Category:

Education


0 download

TRANSCRIPT

Page 1: COMPED9 Module 5 Security and Ethics

COMPUTER EDUCATION 9

MODULE 5Security and Ethics

Prepared By: Engr. Jeremy M. Flores

Page 2: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(1)Thou shall not use

computer to harm other people.

Page 3: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(2)Thou shall not interfere

with other people’s computer work.

Page 4: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(3)Thou shall not snoop

around in other people’s files.

Page 5: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(4)Thou shall not use a computer to steal.

Page 6: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(5)Thou shall not use a

computer to bear false witness.

Page 7: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(6)Thou shall not use or copy

software for which you have not paid.

Page 8: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(7)Thou shall not use other

people’s computer resources without

authorization.

Page 9: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(8)Thou shall not appropriate other people’s intellectual

output.

Page 10: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(9)Thou shall think about the

social consequences of the program you write.

Page 11: COMPED9 Module 5 Security and Ethics

TEN COMPUTER ETHICS

(10)Thou shall use a computer

in ways that shows consideration and respect.

Page 12: COMPED9 Module 5 Security and Ethics

MALWARE

Malicious Software

A code or software that is specifically designed to

damage, disrupt, steal, or in general, inflict some other

“bad” or illegitimate action on data, hosts, or networks.

Page 13: COMPED9 Module 5 Security and Ethics

MALWARE

Malicious Software

Malware cannot damage the physical components of

computer systems and network equipment, but it can damage the data and software residing

on the equipment.

Page 14: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

ADWARE (Advertising-supported Software)

A software or program that automatically delivers

advertisements, such as pop-up ads on websites, and some serves

as revenue generating tool.

Page 15: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

BOT or BOTNET

A software or program created to automatically perform

specific operations. Some are created for relatively harmless purpose, while most are used

for DoS attacks.

Page 16: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

RANSOMWARE

A software or program that essentially holds a computer

system captive, such as restricting user access to the computer, while demanding a

ransom.

Page 17: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

ROOTKIT

A software or program designed to remotely access

or control a computer without being detected by

users or security programs.

Page 18: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

SPYWARE

A software or program that functions by spying on user

activity without their knowledge, such as activity monitoring, collecting keystrokes, data

harvesting, and the like.

Page 19: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

TROJAN HORSE

A software or program that disguises itself as a normal

file or program to trick users into copying, downloading,

and installing malware.

Page 20: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

VIRUS

A software or program that is capable of copying itself and spreading to other computers

by attaching themselves to various programs and

executable files.

Page 21: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

COMPUTER WORM

A software or program that spreads over computer networks by exploiting computer system vulnerabilities, and have the ability to self-replicate and

spread independently.

Page 22: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

KEYLOGGER

A software or program that records keystrokes to steal

information, such as a password.

Page 23: COMPED9 Module 5 Security and Ethics

TYPES OF MALWARE

LOGIC BOMB

A software or program that sits dormant on a computer

until it is triggered by a specific event, such as specific date or time.

Page 24: COMPED9 Module 5 Security and Ethics

TOP DEVELOPERS OF MALWARE

United States of AmericaChina

Germany

7th to 10th Rank: Philippines

Page 25: COMPED9 Module 5 Security and Ethics

AVERAGE MALWARE INFECTION

ONE COMPUTER FOR EVERY TWO

MINUTES INTERVAL.

Page 26: COMPED9 Module 5 Security and Ethics

SYMPTOMS OF MALWARE

Increase CPU usage.Slow computer or web browser

speeds.Problems connecting to networks.

Freezing or crashing.Modified or deleted files.

Page 27: COMPED9 Module 5 Security and Ethics

SYMPTOMS OF MALWARE

Appearance of strange files, programs, or icons.

Programs running, turning off, or reconfiguring themselves.

Emails being sent automatically.Strange computer behaviors.

Page 28: COMPED9 Module 5 Security and Ethics

PREVENTION AND REMOVAL

Install and run anti-malware and firewall software. Choose a

program that offers tools for detecting, quarantining, and removing multiple types of

malware. A combination of an anti-malware software and a firewall will ensure safety.

Page 29: COMPED9 Module 5 Security and Ethics

PREVENTION AND REMOVAL

Keep software and operating systems up to date with current

vulnerability patches for bugs and security flaws that could be

exploited by attackers.

Page 30: COMPED9 Module 5 Security and Ethics

PREVENTION AND REMOVAL

“HIGHLY IMPORTANT”

Be vigilant when copying and downloading files,

programs, attachments, and the like.