Đang chuẩn bị liên kết để tải về tài liệu:
Discovering Computers: Chapter 11 Computer Security, Ethics and Privacy

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

Describe the types of computer security risks Describe the types of computer security risks Identify ways to safeguard against computer Identify ways to safeguard against. Identify ways to safeguard against computer viruses, worms, Trojan horses, denial of service attacks, back doors, and spoofing. Discuss techniques to prevent unauthorized computer access and use. Explain the options available for backing up computer resources. | Chapter 11 Computer Security, Ethics and Privacy Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next Computer Security Risks What is a computer security risk? p. 556 Fig. 11-1 Next Action that causes loss of or damage to computer system Click to view Web Link, click Chapter 11, Click Web Link from left navigation, then click Computer Emergency Response Team Coordination Center below Chapter 11 Computer Viruses, Worms, and Trojan Horses What are viruses, worms, and Trojan horses? p. 558 Next Virus is a potentially damaging computer program Worm copies itself repeatedly, using up resources and possibly shutting down computer or network Trojan horse hides within or looks like legitimate program until triggered Payload (destructive event) that is delivered when you open file, run infected program, or boot computer with infected disk in disk drive Can spread and damage files Does not replicate itself on other computers Computer Viruses, Worms, and Trojan Horses How can a virus spread through an e-mail message? p. 559 Fig. 11-2 Next Step 1. Unscrupulous programmers create a virus program. They hide the virus in a Word document and attach the Word document to an . | Chapter 11 Computer Security, Ethics and Privacy Chapter 11 Objectives Describe the types of computer security risks Identify ways to safeguard against computer viruses, worms, Trojan horses, denial of service attacks, back doors, and spoofing Discuss techniques to prevent unauthorized computer access and use Identify safeguards against hardware theft and vandalism Explain the ways software manufacturers protect against software piracy Define encryption and explain why it is necessary Discuss the types of devices available that protect computers from system failure Explain the options available for backing up computer resources Identify risks and safeguards associated with wireless communications Recognize issues related to information accuracy, rights, and conduct Discuss issues surrounding information privacy Discuss ways to prevent health-related disorders and injuries due to computer use Next Computer Security Risks What is a computer security risk? p. 556 Fig. 11-1 Next Action .