Professional Documents
Culture Documents
0 COMPUTER ETHICS
AND SECURITY
4.1 Computer Ethics
4.1.1 Intellectual Property
1
4.1 Computer Ethics
sanggagakputih.blogspot.com 2
2
LEARNING OUTCOMES :
At the end of this topic, students should
be able to:
sanggagakputih.blogspot.com 3
Computer Ethics
Computer ethics is a rules or guidelines
that used to control computer users.
sanggagakputih.blogspot.com 4
Intellectual Property
Definition :
Unique and original works such as
ideas, inventions, literary and
artistic works, processes, names
and logos.
sanggagakputih.blogspot.com 7
(1) Patent – e.g: Nokia Handphone
sanggagakputih.blogspot.com 8
(2) Trademark
• A distinctive sign which identifies
certain goods or services.
Examples :
LOGO
SIGN
SLOGAN
Color
DESIGN
sanggagakputih.blogspot.com 9
(2) Trademark - Logo
sanggagakputih.blogspot.com 10
(2) Trademark - Sign
sanggagakputih.blogspot.com 11
(2) Trademark - Slogan
I'm loving it
Connecting People
sanggagakputih.blogspot.com 12
(3) Copyright
A legal term describing rights given
to creators for their literary and
artistic works.
sanggagakputih.blogspot.com 13
(3) Copyright
sanggagakputih.blogspot.com 17
Computer Security Risks
sanggagakputih.blogspot.com 18
LEARNING OUTCOMES:
Define computer
security risks.
Identify types of
security risks.
sanggagakputih.blogspot.com 19
DEFINITION
Computer Security Risks
any event or action
that could cause
a loss of or damage to
computer hardware,
software, data,
information, or
processing
capability.
sanggagakputih.blogspot.com 20
Types of Computer Security Risks
Internet and network attack
Hardware theft
Software theft
Information theft
System failure
sanggagakputih.blogspot.com 21
MALWARE DENIAL OF SERVICE ATTACKS
Internet and
network attacks
CLICKJACKING SPOOFING
sanggagakputih.blogspot.com 22
PACKET SNIFFING
Internet and network attacks
Types of malware
Malwa
Malware
re
sanggagakputih.blogspot.com 23
Internet and network attacks
Symptoms Malware
• Operating system runs much slower than • Programs or files do not work
usual properly
• Available memory is less than expected • Unknown programs or files
• Files become corrupted mysteriously appear
• Screen displays unusual message or image • System properties change
• Music or unusual sound plays randomly • Operating system does not start up
• Existing programs and files disappear • Operating system shuts down
unexpectedly
sanggagakputih.blogspot.com 24
Internet and network attacks
1. Worm
sanggagakputih.blogspot.com 25
Internet and network attacks
2. Computer Virus
sanggagakputih.blogspot.com 26
Internet and network attacks
How a Virus Can Spread through an E-Mail Message
Step 1
Unscrupulous programmers
create a virus program that
deletes all files. They hide the
virus in a word processing
document and attach the Step 2
document to an e-mail They send the e-mail message
message. to thousands of users around
the world.
Step 3a
Some users open the attachment and
their computers become infected with
the virus.
Step 3b
Other users do not recognize the name of the sender of the e-
mail
message. These users do not open the e-mail message —
instead
sanggagakputih.blogspot.com 27
they immediately delete the e-mail message and continue using
their
computers. These users’ computers are not infected with the
virus.
Internet and network attacks
3. Trojan horse
sanggagakputih.blogspot.com 28
Internet and network attacks
4. Rootkit
sanggagakputih.blogspot.com 29
Internet and network attacks
5.Botnet / zombie army
botnet, also called a zombie army. The perpetrator then uses the botnet to
send spam via e-mail, spread viruses and other malware, or commit a
sanggagakputih.blogspot.com 31
Internet and network attacks
7.spyware
Spyware is a program placed on a computer without the user’s knowledge that
secretly collects information about the user.
Types of spyware called Web bug, is hidden on Web pages or in e-mail messages
8. Adware
You may see many more pop-up advertising windows than usual
sanggagakputih.blogspot.com 33
Internet and network attacks
Denial of Service Attacks
(DoS)
Denial of service attacks or DoS attack, is an assault whose purpose is to
disrupt computer access to an Internet service such as the Web or e-mail.
sanggagakputih.blogspot.com 34
Internet and network attacks
Spoofing
sanggagakputih.blogspot.com 35
Internet and network attacks
Spoofing
Phishing scam -is a scam in which a perpetrator sends an official looking e-mail
message that attempts to obtain your personal and financial information
sanggagakputih.blogspot.com 36
Internet and network attacks
Spoofing
sanggagakputih.blogspot.com 37
Internet and network attacks
Pharming
That is, when you type a Web address in the Web browser, you are
sanggagakputih.blogspot.com 38
Internet and network attacks
Packet Sniffing
When you transmit data over the internet, the data is not sent in
one continuous stream.
To keep the performance of the internet as high as possible, the
data is cut into pieces
These pieces are called “packets”.
A Packet Sniffer is a program that gathers information from these
packets of data as it travels through the network
It may gather information like user names, passwords and other
confidential data.
Cable modem users are especially vulnerable to this kind of
program.
sanggagakputih.blogspot.com 39
Internet and network attacks
ClickJacking
sanggagakputih.blogspot.com 40
Unauthorized Access
and Use
Unauthorized access
The use of a computer or network without permission.
Unauthorized use
The use of a computer or its data for unapproved or
possibly illegal activities.
sanggagakputih.blogspot.com 41
Hardware Theft and
Vandalism
Hardware theft
Is the act of stealing computer equipment.
Hardware vandalism
The act of defacing or destroying computer
equipment.
sanggagakputih.blogspot.com 42
Software Theft
sanggagakputih.blogspot.com 43
Information Theft
If stolen, the loss of information can cause as much damage as (if not more
sanggagakputih.blogspot.com 44
System Failure
Is the prolonged malfunction of a computer. System failure also
can cause loss of hardware, software, data, or information.
Effect
System failure
The payload is the destructive event or prank the program is intended to deliver.
Cookies a small text file that a Web server stores on your computer.Cookie files typically
contain data about you, such as your user name or viewing preferences.
Malware is a programs that act without a user’s knowledge and deliberately alter the
computer’s operations.
A more devastating type of DoS attack is the DDoS (distributed DoS) attack, in which a
zombie army (botnet) is used to attack computers or computer networks.
Phishing scam -is a scam in which a perpetrator sends an official looking e-mail
message that attempts to obtain your personal and financial information
sanggagakputih.blogspot.com 47
CONCLUSION
Conclusion
Malware delivers its payload on a computer in a variety of ways:
when a user
(1) opens an infected file,
(2) runs an infected program,
(3) boots the computer with infected removable
media inserted in a drive or plugged in a port,
(4) connects an unprotected computer to a network,
or
(5) when a certain condition or event occurs, such as the computer’s
clock changing to a specific date.
sanggagakputih.blogspot.com 48
4.0 COMPUTER ETHICS AND
SECURITY
4.1 Computer Ethics
4.1.1 Intellectual Property
4.2 Computer Security
4.2.1 Computer Security Risks
4.2.2 Security Measures
sanggagakputih.blogspot.com 49
LEARNING OUTCOMES :
sanggagakputih.blogspot.com 50
A n
n t
Security Measures
t
i
i
s
C
v S p
r
i y F
y e H
r w i
p u
u c a r
t m
s u r e
o a
e w
g r n
a
r A
D i l
a s
a t l
p p
t h y e
a y
M c
B
t
a e :
c a A
k
s w
u
a
p u
sanggagakputih.blogspot.com
r 51
r e
e n
e
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]
sanggagakputih.blogspot.com 52
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]
sanggagakputih.blogspot.com 53
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]
54
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]
sanggagakputih.blogspot.com 55
55
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]
CA Personal Firewall
ZoneAlarm Pro
sanggagakputih.blogspot.com 56
56
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]
Don't start a
computer with
removable media in
the drives or ports.
sanggagakputih.blogspot.com 57
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]
58
SECURITY MEASURES
Internet and network attacks :
[Worm, Computer Virus, Trojan Horse and Rootkit]
sanggagakputih.blogspot.com 59
SECURITY MEASURES
Internet and network attacks :
Spyware and Adware
Examples :
Ad-Aware
Spy Sweeper
Windows Defender
sanggagakputih.blogspot.com 60
SECURITY MEASURES
Internet and network attacks :
Botnets, DoS Attacks, Back Doors, and Spoofing
sanggagakputih.blogspot.com 62
SECURITY MEASURES
Information Theft
sanggagakputih.blogspot.com 64
64
SECURITY MEASURES
Hardware/Software/Information theft
& System failure
sanggagakputih.blogspot.com 65
SECURITY MEASURES
Unauthorized Access and Use
66
SECURITY MEASURES
System failure
sanggagakputih.blogspot.com 67
67
SECURITY MEASURES
Authentication
sanggagakputih.blogspot.com 69
Summary
Computer Security Risks Security Measures
Hardware/Software/Information Data backup
theft and System failure
sanggagakputih.blogspot.com 70
QUESTION 1
sanggagakputih.blogspot.com 74