8. Security Flashcards
5 Security Risks
- Virus
- Unauthorised Access & Use
- Hardware Theft & Vandalism
- Information Theft
- System Failure
Virus Solutions
Antivirus program (vaccines) - 1 of the more effective ways to protect against viruses
- Made to detect, disinfect & protect computers & networks from viruses.
- Function by looking for programs that attempt to modify boot program, operating system or other programs that are usually read from but not written to.
- If virus has infected boot program may need to restart computer with rescue disc.
Unauthorised Access and Use Solutions
Access Controls - security measures - who can access a computer, when they can access it & what actions they can make when using it.
Students only have access to programs, data & information for for which they are granted.
Provide Authorised users with unique user identification - user ID (username) & password.
When user logs in OS checks if user ID and password match entries stored in authorisation file.
If entries match user is granted access.
Possessed Objects & Biometric Devices
Possessed Object - anything that must carry to be granted access to computer or computer facility.
Examples: badges, cards, smart cards & keys.
ATMs use Possessed Objects.
Often used with PIN (Personal Identification Number) which is numeric password - for additional level of security.
Biometric Devices
Authenticate person’s identity by translating personal characteristic: fingerprint into digital code which is compared with stored digital code in computer to verify personal characteristic.
Firewall
Security System consisting of hardware and or software that prevents unauthorised access to data & information on network.
Use firewall to deny access to outsiders & restrict both students & teachers from accessing sensitive data.
Hardware Theft & Vandalism Solutions
Install security systems.
Install physical security devices: cables that lock equipment to desk, cabinet or floor.
Install deadbolt locks & alarm systems to protect equipment in computer labs.
Written policies & procedures for dealing with different types of vandalism.
Information Theft Solutions
Encryption - converting readable data into unreadable characters by applying formula that uses code called encryption key.
Person who receives message uses same encryption key to decrypt it.
Both sender and receiver computers use same encryption software.
System Failure Solutions
Surge Protector - device that use uses special electrical components to smooth out minor voltage errors, provide a stable current flow & keep over voltage from damaging computer equipment
UPS (Uninterruptible Power Supply) - contains surge protection circuits & one or more batteries that provide power during temporary or permanent loss of power
Backing up
To prevent data loss caused by system failure or computer virus backup important files.
Backup - duplicate of file, program or disk that can be used if the original is lost, damaged or destroyed.
Software Theft Solution
Ensure Software is licensed & has product activation
Virus
Program made to affect computer negatively by changing way it functions without your knowledge or permission.
Information Theft
Obtaining information illegally without permission
System Failure
Malfunction of computer - because of electrical power problems, hardware component failure or software error that causes data or information loss.
Hardware Theft & Vandalism
Hardware Theft - stealing computer hardware
Computer Vandalism - takes many forms - damaging equipment, deleting files, breaking into schools & randomly smashing computers.
Educational Controls
Filtering Software
Acceptable Use Policies
Curriculum Resource Pages
Teacher Observation
Unauthorised Use of Computers
Use of a computer or network without permission.
Hacker/ Cracker - Person who accesses computer or network illegally
often with intent to steal or corrupt data.
Break into system via modem & logging on as a user.
Unauthorised Use - Using a computer or data without permission possibly for illegal activities.
Hardware, software & Information theft
…
Areas of Computer Ethics
- Unauthorised use of computers
- Hardware, Software & Information theft
- Information Privacy
- Copyright
- Existence of Objectionable material on Internet