Skip to content

CIS105: Computer Applications & Information Systems Lect. 11

Author:Anda Toshiki
Updated:a day ago
Words:406
Reading:2 min

Chapter 11: Computer Security

Midterm reminder: March 28th - 29th

  • Exam Review after Chapter 11KC
  • 40 new questions, 10 KC questions
    • Same format as last time

11.1: System Security & Computer Privacy

  • An unsecured computer is extremely easy to breach by any seasoned hacker
  • Computer Security: Concerned with risk management, confidentiality, integrity, and the availability of the electronic info processed and stored within a computing system
  • Risk Management: Includes the recognition, consequences, and assessment of risk to a computer's assets, and developing strategies to manage and protect them

11.2: Business System Threats

  • Intranet: A businesses' private version of the internet
  • The key aspect of an intranet is privacy
  • Firewall: Hardware and software working together to ensure that only authorized personnel can access the business' intranet

11.3: Firewall

  • Without a firewall, an intranet is just another part of the internet
  • Proxy Server: A special security computer that allows communication to flow in and out of an intranet to check for external threats
  • Two standard security practices for firewalls:
    • Default-Deny
    • Default-Allow

11.4: Malware Threats

  • The term "virus" comes from biology
  • Malware Motivations:
    • Experimental Malware
    • Worms
    • Trojan Horses
    • Spyware/Keylogging
    • Adware
    • Spamming
    • Denial-of-Service Attach (DoS)
      • The deadliest
    • Reverse Phishing - "Spear Phishing"

11.5: Malware Solutions

  • Antivirus Software
    • Norton AntiVirus
    • McAfee's VirusScan
  • System patches
  • Data Backup
  • Employee training

11.6: Internet Fraud

  • Internet fraud: Any fraudulent activity in an online setting
  • Google AdSense, Google's advertising network; the middleman between the advertiser and the website owner
  • Click Fraud: a program that automatically clicks on Ads
  • Purchase Scam: scammer asks seller to pay for shipping via credit card, cancels credit card after order has shipped
  • Most uncomplicated type of internet fraud
  • Phishing: Uses social engineering techniques to gain private information

11.7: Computer Privacy

  • Privacy: The ability of an individual to keep their personal information out of public view
  • Anonymous: One's personal identity Is not be known
  • Tracking Cookie: A small text file that tracks your interaction on a website
  • History files: A list of stored or cached websites on a user's computer

50% of the time an unsecured computer can be hacked, and a password can be guessed

11.8: Identity Theft

  • Identity theft: A crime concerning the unlawful practice of assuming another individual's identity
  • Ways to acquire personal information:
    • Shoulder Surfing
    • Dumpster Diving
  • SCAM
    • Stingy
    • Check
    • Ask
    • Maintain
  • ASU's Recommended Password Manager: Stache
    • Bitwarden, 1Password, Dashlane, Keeper, KeePass