8. Security Flashcards

1
Q

5 Security Risks

A
  1. Virus
  2. Unauthorised Access & Use
  3. Hardware Theft & Vandalism
  4. Information Theft
  5. System Failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus Solutions

A

Antivirus program (vaccines) - 1 of the more effective ways to protect against viruses

  • Made to detect, disinfect & protect computers & networks from viruses.
  • Function by looking for programs that attempt to modify boot program, operating system or other programs that are usually read from but not written to.
  • If virus has infected boot program may need to restart computer with rescue disc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unauthorised Access and Use Solutions

A

Access Controls - security measures - who can access a computer, when they can access it & what actions they can make when using it.

Students only have access to programs, data & information for for which they are granted.
Provide Authorised users with unique user identification - user ID (username) & password.
When user logs in OS checks if user ID and password match entries stored in authorisation file.
If entries match user is granted access.

Possessed Objects & Biometric Devices

Possessed Object - anything that must carry to be granted access to computer or computer facility.
Examples: badges, cards, smart cards & keys.
ATMs use Possessed Objects.
Often used with PIN (Personal Identification Number) which is numeric password - for additional level of security.

Biometric Devices

Authenticate person’s identity by translating personal characteristic: fingerprint into digital code which is compared with stored digital code in computer to verify personal characteristic.

Firewall

Security System consisting of hardware and or software that prevents unauthorised access to data & information on network.
Use firewall to deny access to outsiders & restrict both students & teachers from accessing sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Hardware Theft & Vandalism Solutions

A

Install security systems.

Install physical security devices: cables that lock equipment to desk, cabinet or floor.

Install deadbolt locks & alarm systems to protect equipment in computer labs.

Written policies & procedures for dealing with different types of vandalism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information Theft Solutions

A

Encryption - converting readable data into unreadable characters by applying formula that uses code called encryption key.
Person who receives message uses same encryption key to decrypt it.
Both sender and receiver computers use same encryption software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

System Failure Solutions

A

Surge Protector - device that use uses special electrical components to smooth out minor voltage errors, provide a stable current flow & keep over voltage from damaging computer equipment

UPS (Uninterruptible Power Supply) - contains surge protection circuits & one or more batteries that provide power during temporary or permanent loss of power

Backing up

To prevent data loss caused by system failure or computer virus backup important files.
Backup - duplicate of file, program or disk that can be used if the original is lost, damaged or destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software Theft Solution

A

Ensure Software is licensed & has product activation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus

A

Program made to affect computer negatively by changing way it functions without your knowledge or permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Information Theft

A

Obtaining information illegally without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

System Failure

A

Malfunction of computer - because of electrical power problems, hardware component failure or software error that causes data or information loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hardware Theft & Vandalism

A

Hardware Theft - stealing computer hardware

Computer Vandalism - takes many forms - damaging equipment, deleting files, breaking into schools & randomly smashing computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Educational Controls

A

Filtering Software
Acceptable Use Policies
Curriculum Resource Pages
Teacher Observation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Unauthorised Use of Computers

A

Use of a computer or network without permission.

Hacker/ Cracker - Person who accesses computer or network illegally

often with intent to steal or corrupt data.

Break into system via modem & logging on as a user.

Unauthorised Use - Using a computer or data without permission possibly for illegal activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hardware, software & Information theft

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Areas of Computer Ethics

A
  1. Unauthorised use of computers
  2. Hardware, Software & Information theft
  3. Information Privacy
  4. Copyright
  5. Existence of Objectionable material on Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Copyright Law

A

Covers software to protect from privacy

Author holds ownership & has exclusive right to reproduce & distribute work.

17
Q

Information Privacy

A

Right of individuals & organisations to deny or restrict others from obtaining or using information about them.

Most informations gets stored digitally in same place today for convenience & efficiency. However it makes it much easier steal & use.

Users are concerned about their privacy being invaded by information being accessed, used or monitored.

18
Q

Objectionable Material

A

Internet has made it easier for anyone to access inappropriate material.

Staff must concern with 3 different types of objectionable Internet materials

1 -porn - inappropriate pictures, videos etc
2 - racist language & controversial subjects
Easy to recognise
3 - incorrect material - more difficult to recognise

Many want to ban or restrict - so not available to children but goes against free speech.

Teachers should teach students right from wrong

19
Q

Computer Ethics for Educators

A
  1. Don’t use computer to harm people
  2. Don’t use computer to steal
  3. Don’t copy or use software without paying
  4. Don’t interfere with others’ work
  5. Don’t look at others’ computer files