Sunteți pe pagina 1din 74

4.

0 COMPUTER ETHICS
AND SECURITY
4.1 Computer Ethics
4.1.1 Intellectual Property

4.2 Computer Security


4.2.1 Computer Security Risk
4.2.2 Security Measures
sanggagakputih.blogspot.com 1

1
4.1 Computer Ethics

4.1.1 Intellectual Property

sanggagakputih.blogspot.com 2

2
LEARNING OUTCOMES :
 At the end of this topic, students should
be able to:

◦ Define Intellectual Property.


◦ Identify types of Intellectual Property.
◦ Describe the importance of
Intellectual Property.

sanggagakputih.blogspot.com 3
Computer Ethics
 Computer ethics is a rules or guidelines
that used to control computer users.

sanggagakputih.blogspot.com 4
Intellectual Property
Definition :
 Unique and original works such as
ideas, inventions, literary and
artistic works, processes, names
and logos.

 Refer to the creation of mind used


in commerce.
sanggagakputih.blogspot.com 5
e
l
l
Intellectual Property
e
c
Categories : t
u
a
l T C
r o
P P p
a r a
d y
t o e r
e
n
p m i
e a g
t
r r h
t k t
y sanggagakputih.blogspot.com 6
(1) Patent
Patent is an exclusive right granted for an
invention

Invention → a product or a process


that provides a new way of doing
something, or offers a new technical
solution to a problem.

sanggagakputih.blogspot.com 7
(1) Patent – e.g: Nokia Handphone

sanggagakputih.blogspot.com 8
(2) Trademark
• A distinctive sign which identifies
certain goods or services.

Examples :
LOGO
SIGN
SLOGAN
Color
DESIGN
sanggagakputih.blogspot.com 9
(2) Trademark - Logo

sanggagakputih.blogspot.com 10
(2) Trademark - Sign

sanggagakputih.blogspot.com 11
(2) Trademark - Slogan

 I'm loving it
 Connecting People

 Finger Lickin' Good

sanggagakputih.blogspot.com 12
(3) Copyright
A legal term describing rights given
to creators for their literary and
artistic works.

sanggagakputih.blogspot.com 13
(3) Copyright

literary works - novels, poems, plays,


reference works, newspapers, computer
programs, databases, films, musical
compositions, and choreography

artistic works - paintings, drawings,


photographs, sculpture, architecture,
advertisements, maps and technical
drawings sanggagakputih.blogspot.com 14
Importance of Intellectual
Property
 To protect any original work that
created by individual person/
company for example, image,
drawing, lyric, publishing and so on.

 Preserve the features and processes


that make things work. This lets
inventors profit from their inventions.
sanggagakputih.blogspot.com 15
SUMMARY
 Define Intellectual Property.

 Identify types of Intellectual


Property.

 Describe the importance of


Intellectual Property.
sanggagakputih.blogspot.com 16
4.0 COMPUTER ETHICS
AND SECURITY

4.1 Computer Ethics


4.1.1Intellectual Property
4.2 Computer Security
4.2.1 Computer Security Risks
4.2.2 Security Measures

sanggagakputih.blogspot.com 17
Computer Security Risks
sanggagakputih.blogspot.com 18
LEARNING OUTCOMES:

 At the end of this topic, students


should be able to:

 Define computer
security risks.
 Identify types of
security risks.

sanggagakputih.blogspot.com 19
DEFINITION
Computer Security Risks
any event or action
that could cause
a loss of or damage to
computer hardware,
software, data,
information, or
processing
capability.
sanggagakputih.blogspot.com 20
Types of Computer Security Risks
Internet and network attack

Unauthorized access and use

Hardware theft

Software theft

Information theft

System failure
sanggagakputih.blogspot.com 21
MALWARE DENIAL OF SERVICE ATTACKS

Internet and
network attacks

CLICKJACKING SPOOFING

sanggagakputih.blogspot.com 22
PACKET SNIFFING
Internet and network attacks
Types of malware

Malwa
Malware
re

sanggagakputih.blogspot.com 23
Internet and network attacks
Symptoms Malware
• Operating system runs much slower than • Programs or files do not work
usual properly
• Available memory is less than expected • Unknown programs or files
• Files become corrupted mysteriously appear
• Screen displays unusual message or image • System properties change
• Music or unusual sound plays randomly • Operating system does not start up
• Existing programs and files disappear • Operating system shuts down
unexpectedly

sanggagakputih.blogspot.com 24
Internet and network attacks
1. Worm

is a program that copies itself repeatedly, for


example in memory or on a network, using up
resources and possibly shutting down the
computer or network.

sanggagakputih.blogspot.com 25
Internet and network attacks
2. Computer Virus

is a potentially damaging it can spread throughout and may


computer program that affects, or damage files and system software,
infects, a computer negatively by including the operating system.
altering the way the computer
works without the user’s
knowledge or permission.

sanggagakputih.blogspot.com 26
Internet and network attacks
How a Virus Can Spread through an E-Mail Message
Step 1
Unscrupulous programmers
create a virus program that
deletes all files. They hide the
virus in a word processing
document and attach the Step 2
document to an e-mail They send the e-mail message
message. to thousands of users around
the world.
Step 3a
Some users open the attachment and
their computers become infected with
the virus.

Step 3b
Other users do not recognize the name of the sender of the e-
mail
message. These users do not open the e-mail message —
instead
sanggagakputih.blogspot.com 27
they immediately delete the e-mail message and continue using
their
computers. These users’ computers are not infected with the
virus.
Internet and network attacks
3. Trojan horse

Is a program that hides it can spread throughout


within or looks like a and may damage files and
legitimate program. It system software, including
does not replicate itself the operating system.
to other computers.

sanggagakputih.blogspot.com 28
Internet and network attacks
4. Rootkit

Is a program that hides in a computer and allows someone


from a remote location to take full control of the computer.

The rootkit author can execute programs, change settings,


monitor activity, and access files on the remote computer

sanggagakputih.blogspot.com 29
Internet and network attacks
5.Botnet / zombie army

Definition : a group of compromised computers connected to a network such as the Internet


that are used as part of a network that attacks other networks, usually for nefarious purposes.

A bot is a program that performs a repetitive task on a network.

Cybercriminals install malicious bots on unprotected computers to create a

botnet, also called a zombie army. The perpetrator then uses the botnet to

send spam via e-mail, spread viruses and other malware, or commit a

distributed denial of service attack,


sanggagakputih.blogspot.com 30
Internet and network attacks
6.Back doors

Definition : a program or set of instructions in a program that allow users to bypass


security controls when accessing a program, computer, or network

they often install a back door or modify an existing program to include a


back door, which allows them to continue to access the computer
remotely without the user’s knowledge.

sanggagakputih.blogspot.com 31
Internet and network attacks
7.spyware
 Spyware is a program placed on a computer without the user’s knowledge that
secretly collects information about the user.

Types of spyware called Web bug, is hidden on Web pages or in e-mail messages

in the form of graphical images.

8. Adware

Adware is a program that displays an online advertisement in a banner or 32


sanggagakputih.blogspot.com pop-up
window on Web pages, e-mail messages, or other Internet services.
Internet and network attacks
Symptoms : spyware/ adware

You may see many more pop-up advertising windows than usual

Your web browser may go to sites you do not expect

Several other symptoms could indicate spyware or another type

of infection, such as a virus:

Your system may seem sluggish or become unstable

Network traffic on your system may increase

sanggagakputih.blogspot.com 33
Internet and network attacks
Denial of Service Attacks
(DoS)
 Denial of service attacks or DoS attack, is an assault whose purpose is to
disrupt computer access to an Internet service such as the Web or e-mail.

 Zombie - A compromised computer, is one whose owner is unaware


the computer is being controlled remotely by an outsider (zombie
Army/ botnet).
 Symptoms
– The victim computer network slows down considerably.

– unresponsive or unavailable, blocking legitimate visitors from


accessing the network.

sanggagakputih.blogspot.com 34
Internet and network attacks
Spoofing

Definition: a technique intruders use to make their network or Internet


transmission appear legitimate to a victim computer or network.
E-mail spoofing commonly is used for virus hoaxes, spam, and phishing
scams, IP spoofing, occurs when an intruder computer fools a network into
believing its IP address is associated with a trusted source. The victim may
provide confidential information or download files containing viruses, worms,
or other malware.

sanggagakputih.blogspot.com 35
Internet and network attacks
Spoofing

Phishing scam -is a scam in which a perpetrator sends an official looking e-mail
message that attempts to obtain your personal and financial information

sanggagakputih.blogspot.com 36
Internet and network attacks
Spoofing

Spam - is an unsolicited e-mail message or newsgroup posting sent to many


recipients or newsgroups at once. Spam is Internet junk mail

sanggagakputih.blogspot.com 37
Internet and network attacks
Pharming

Is a scam, similar to phishing, where a perpetrator attempts to obtain your

personal and financial information, except they do so via spoofing.

That is, when you type a Web address in the Web browser, you are

redirected to a phony Web site that looks legitimate.

sanggagakputih.blogspot.com 38
Internet and network attacks
Packet Sniffing

 When you transmit data over the internet, the data is not sent in
one continuous stream.
To keep the performance of the internet as high as possible, the
data is cut into pieces
These pieces are called “packets”.
A Packet Sniffer is a program that gathers information from these
packets of data as it travels through the network
It may gather information like user names, passwords and other
confidential data.
Cable modem users are especially vulnerable to this kind of
program.
sanggagakputih.blogspot.com 39
Internet and network attacks
ClickJacking

Object that can be clicked on a Web site, such as a button,

image, or link, contains a malicious program.

sanggagakputih.blogspot.com 40
Unauthorized Access
and Use

Unauthorized access
The use of a computer or network without permission.

Unauthorized use
The use of a computer or its data for unapproved or
possibly illegal activities.
sanggagakputih.blogspot.com 41
Hardware Theft and
Vandalism

Hardware theft
Is the act of stealing computer equipment.

Hardware vandalism
The act of defacing or destroying computer
equipment.
sanggagakputih.blogspot.com 42
Software Theft

Steals software media

Intentionally erases programs,

Illegally copies a program (Software Piracy- the unauthorized and illegal

duplication of copyrighted software.),

Illegally registers and/or activates a program.

sanggagakputih.blogspot.com 43
Information Theft

Occurs when someone steals personal or confidential information.

If stolen, the loss of information can cause as much damage as (if not more

than) hardware or software theft.

sanggagakputih.blogspot.com 44
System Failure
 Is the prolonged malfunction of a computer. System failure also
can cause loss of hardware, software, data, or information.

 Effect
 System failure

 Aging hardware; natural disasters such as fires, floods, or


hurricanes;

 Electrical power variations can cause loss of data and loss


of equipment. (Noise, undervoltage, overvoltage, or
power surge[also called spike]
sanggagakputih.blogspot.com 45
Internet and network attacks
Term :
Unscrupulous programmers write malware and then test it to ensure it can deliver its
payload.

The payload is the destructive event or prank the program is intended to deliver.

Cookies a small text file that a Web server stores on your computer.Cookie files typically

contain data about you, such as your user name or viewing preferences.

Malware is a programs that act without a user’s knowledge and deliberately alter the
computer’s operations.

Denial of service attacks or DoS attack, is an assault whose purpose is to disrupt


computer access to an Internet service such as the Web or e-mail.
sanggagakputih.blogspot.com 46
Internet and network attacks
Term :

A more devastating type of DoS attack is the DDoS (distributed DoS) attack, in which a
zombie army (botnet) is used to attack computers or computer networks.

Zombie - A compromised computer, is one whose owner is unaware the computer is


being controlled remotely by an outsider.

Spam - is an unsolicited e-mail message or newsgroup posting sent to many recipients or


newsgroups at once. Spam is Internet junk mail

Phishing scam -is a scam in which a perpetrator sends an official looking e-mail
message that attempts to obtain your personal and financial information

sanggagakputih.blogspot.com 47
CONCLUSION
Conclusion
Malware delivers its payload on a computer in a variety of ways:
when a user
(1) opens an infected file,
(2) runs an infected program,
(3) boots the computer with infected removable
media inserted in a drive or plugged in a port,
(4) connects an unprotected computer to a network,
or
(5) when a certain condition or event occurs, such as the computer’s
clock changing to a specific date.
sanggagakputih.blogspot.com 48
4.0 COMPUTER ETHICS AND
SECURITY
4.1 Computer Ethics
4.1.1 Intellectual Property
4.2 Computer Security
4.2.1 Computer Security Risks
4.2.2 Security Measures
sanggagakputih.blogspot.com 49
LEARNING OUTCOMES :

 At the end of this topic, students


should be able to:

 Identify different ways to


overcome security risks.

sanggagakputih.blogspot.com 50
A n
n t
Security Measures
t
i
i
s
C
v S p
r
i y F
y e H
r w i
p u
u c a r
t m
s u r e
o a
e w
g r n
a
r A
D i l
a s
a t l
p p
t h y e
a y
M c
B
t
a e :
c a A
k
s w
u
a
p u
sanggagakputih.blogspot.com
r 51
r e
e n
e
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]

Install an antivirus program and a


personal firewall.

sanggagakputih.blogspot.com 52
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]

An antivirus program protects a


computer against viruses found in
memory, on storage media, or on
incoming files.

sanggagakputih.blogspot.com 53
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]

Popular Antivirus Programs :


 AVG Anti-Virus
 Avast Anti-virus
 BitDefender Anti-Virus
 F-Secure Anti-Virus
 Kaspersky Anti-Virus
 McAfee VirusScan
 Norton Antivirus
sanggagakputih.blogspot.com 54

54
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]

A personal firewall is a utility program


that detects and protects a personal
computer and its data from unauthorized
intrusions.

sanggagakputih.blogspot.com 55

55
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]

Stand-Alone Personal Firewall Software :


 BitDefender Internet Security

 CA Personal Firewall

 McAfee Internet Security

 Norton Personal Firewall

 Webroot Desktop Firewall

 ZoneAlarm Pro

sanggagakputih.blogspot.com 56

56
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]

Don't start a
computer with
removable media in
the drives or ports.

sanggagakputih.blogspot.com 57
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]

Don't open an e-mail


attachment unless
you are expecting the
attachment and it is
from a trusted
source.
sanggagakputih.blogspot.com 58

58
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]

Stay informed about any new virus alert


or virus hoax.

sanggagakputih.blogspot.com 59
SECURITY MEASURES
Internet and network attacks :
Spyware and Adware

Spyware remover : Program that detects and


deletes spyware and other similar programs
on a user's computer.

Examples :
 Ad-Aware

 Spy Sweeper

 Windows Defender

sanggagakputih.blogspot.com 60
SECURITY MEASURES
Internet and network attacks :
Botnets, DoS Attacks, Back Doors, and Spoofing

A firewall is hardware and/or


software that protects a network's
resources from intrusion by users
on another network such as the
Internet.
sanggagakputih.blogspot.com 61
SECURITY MEASURES
Internet and network attacks :
Botnets, DoS Attacks, Back Doors, and Spoofing

sanggagakputih.blogspot.com 62
SECURITY MEASURES
Information Theft

Cryptography : Technology of encoding


information so it can only be read by
authorized individuals.

 Encryption : Process of converting


readable
data into unreadable characters
to prevent unauthorized access.

 Decryption : Process to decode encrypted


data. sanggagakputih.blogspot.com 63
SECURITY MEASURES
Information Theft

sanggagakputih.blogspot.com 64

64
SECURITY MEASURES
Hardware/Software/Information theft
& System failure

A backup is a duplicate of a file,


program, or disk that can be used if
the original is lost, damaged, or
destroyed.

sanggagakputih.blogspot.com 65
SECURITY MEASURES
Unauthorized Access and Use

Identification & Authentication


sanggagakputih.blogspot.com 66

66
SECURITY MEASURES
System failure

Two ways to protect from system failures


caused by electrical power variations include
 surge protectors and

 uninterruptible power supplies (UPS)

sanggagakputih.blogspot.com 67

67
SECURITY MEASURES

Human Aspects : Awareness

 Provide in-house training for employees


or staff in computing to expose them in
computer security.
 Make a routine check to update from
new
virus, worm or other malicious threat.
 Make sure that do not make any mistake
in handlingsanggagakputih.blogspot.com
a computer and information.68
Summary
Computer Security Risks Security Measures
Internet and network attacks :  Antivirus program
worm, computer virus, trojan horse  Personal firewall
and rootkit

Internet and network attacks :  Spyware remover


spyware and adware  Adware remover

Internet and network attacks :  Firewall


Botnet, DoS attack, Back Door and
Spoofing

Unauthorized access and use  Firewall


 Identification

 Authentication
sanggagakputih.blogspot.com 69
Summary
Computer Security Risks Security Measures
Hardware/Software/Information  Data backup
theft and System failure

Information theft  Cryptography

System failure  Surge protector


 Uninterruptible Power Supplies

***** Human Aspects : Awareness ****

sanggagakputih.blogspot.com 70
QUESTION 1

1. Qausar works as an Information System Officer


in Takaful Insurance Company. One of his
responsibilities is to make sure all
corporate clients' data and information
protected and safe.

a) State the definition of Computer Security


Risks.
b) State one (1) example of security risk.
c) Identify two (2) security measures those are
suitable to overcome the security risk
mentioned in 1 b).
sanggagakputih.blogspot.com 71
d) Name the technology that encodes
information
QUESTION 2

2. Lately Dr. Yassin has found that his computer


has been illegally access by someone. In
order to overcome this problem, he has created a
logon username and password for his
computer. Furthermore, his computer
has been infected with various malicious
codes.

a) State the name of the action underlined in


the paragraph above.
b) Give one (1) advantage of the action taken.
c) Name one (1) type of malicious codes that has
sanggagakputih.blogspot.com 72
possibly attacked his computer.
d) Identify one (1) security measures that he can
QUESTION 3

a. Computer viruses, worms, Trojan horses, and


rootkits are classified as ____, which are
programs that act without a
user’s knowledge and deliberately alter the
computer’s operations.

b. ____ is a technique intruders use to make their


network or Internet transmission appear
legitimate to a victim
computer or network.

c. A personal ____ is a utility program that detects


sanggagakputih.blogspot.com 73

and protects a personal computer and its data


from unauthorized access.
QUESTION 3

d. ____ occurs when someone steals personal or


confidential information.

e. A system ____ is the prolonged malfunction of a


computer.

f. A(n) ____ is a device that contains surge


protection circuits and one or
more batteries that can provide power during a
temporary or permanent loss of power.

sanggagakputih.blogspot.com 74

S-ar putea să vă placă și