Date post: | 16-Dec-2015 |
Category: |
Documents |
Upload: | ami-waters |
View: | 216 times |
Download: | 1 times |
Wireless Security
Techniques use to Access the network War Driving or access point mapping▪ Individuals attempt to detect wireless
network via their notebook computer or mobile device while driving a vehicle through areas they suspect have a wireless network
War Flying▪ Use airplanes instead of vehicle to detect
unsecured wireless network
Wireless Security
How can I ensure my wireless communication is secure?
Firewalls Secure your wireless access point (WAP) WiFi Protected Access (WPA)
Authenticate network users and provide advanced encryption techniques
802.11i (WPAs)Conforms to the government security standards and
uses more sophisticated encryption techniques the WPA
Health Concerns of Computer Use
What are some health concerns of computer use?
Computer vision syndrome (CVS) eye and vision
problems
Computer addiction-when computer consume entire
social
Tendonitis – inflammation of a
tendon due to repeated motion
Carpal tunnel syndrome – inflammation of the nerve that connects the forearm
to the palm
Repetitive strain injury (RSI) Injury or disorder of the muscles, nerves, tendons, ligaments, and
joints
Health Concerns of Computer Use
What precautions can prevent tendonitis or carpal tunnel syndrome? Spread fingers apart for several seconds
while keeping wrist straight Gently push back fingers and then
thumb Dangle arms loosely at sides and shake
arms and hands
Ergonomics and Workplace Design
What is Ergonomics?An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Ethics and Society
What are computer ethics?
Moral guidelines that govern use of computers and information systems
Unauthorized use of
computer &Networks
Intellectual property
rights
Codes of conduct
Information privacy
Information accuracy
Software theft(piracy)
Green Computing
Ethics and Society
What is information accuracy?
Accuracy of computer input Altering photo
National Press Photographer Association oppose
Ethics and Society
What are intellectual Property (IP) and Intellectual property rights? Intellectual Property▪ Refer to unique & original work such as ideas,
inventions, art, writing, processes, company and product name and logos.
Intellectual Property Rights▪ The rights to which creators are entitled for
their work
Ethics and Society
What is an IT code of conduct? Written guideline
that helps determine whether computer action is ethical
Employers can distribute to employees
IT Code of Conduct1. Computer may not be used to
harm other people.2. Employee may not interfere with
other’s computer work.3. Employees my not meddle in
other’s computer files.4. Computers may not be used to
steal5. .Computers may not be used to
bear false witness.6. Employees may not copy or use
software illegally.7. Employees may not use others’
computer resources without authorization
8. Employees may not use others’ intellectual property as their own.
9. Employees shall consider the social impact of program and systems they design.
10. Employees always should use computers in a way that demonstrates and respect for fellow humans.
Ethics and Society
What is Green Computing? Involves reducing the electricity and
environmental waste while using a computer.
ENERGY STAR program▪ Develop by US Department of Energy and US
Environmental Protection Agency (EPA)▪ Help reduce the amount of electricity used by
computer and related devices
Information Privacy – Section 5
What is Information Privacy? Right of individual and companies to
deny or restrict the collection and use of information about them
Difficult to maintain today because data is stored online
Information Privacy
What is an electronic profile? Data collected when you fill out forms on
the Web Merchant sell your electronic profile Often you can specify whether you want
personal information distributed
Information Privacy
What is a Cookie?
Small text file on your
computer that contains data
about you
Set browser to accept cookies, prompt you to accept cookies
or disable cookies
Some Web sites sell or
trade information
stored on your cookie
User Preferenc
es
How regularly you visit Web site
Interest and
browsing habits
Information Privacy
What is Spam? Unsolicited e-mail message or
newsgroup, posting sent to many recipients or newsgroups at once.
Internet Junk mail
Information Privacy
How can you control spam?
E-mail filtering
Anti-spam program
Service that blocks email messages
from designated
source
Attempts to
remove spam
Collects spam in central
location that you can
view anytime
Sometimes removes
valid email messages
Information Privacy
What is Phishing and Pharming?
Phishing Scam in which a
perpetrator sends an official looking email
message that attempts to obtain your personal
and financial information
PharmingSimilar as phishing but
they attempts to obtain your personal
and financial information through
spoofing
Information Privacy
What are Spyware and Adware?
Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user
Adware is a program that displays an online advertisement
Information Privacy
Some Privacy laws that have been enacted
1970 Fair Credit Reporting Act Limits the right of other viewing a credit report to only
those with a legitimate business need. 1984 Computer Fraud and Abuse Act
Outlaws unauthorized access of federal government computers
1998 Children’s Online Privacy Protection Act (COPPA) Requires Web sites protect personal information of children
under 13 years of age
Information Privacy
What is Social Engineering?
Gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and naivety of other
Information Privacy
What is Employee Monitoring?
Involves the use of computers to observe, record, and review an employee’s use of a computer