Vous êtes sur la page 1sur 74
4.0 COMPUTER ETHICS AND SECURITY 4.1 Computer Ethics 4.1.1 Intellectual Property
4.0 COMPUTER ETHICS
AND SECURITY
4.1 Computer Ethics
4.1.1 Intellectual Property
  • 4.2 Computer Security

    • 4.2.1 Computer Security Risk

    • 4.2.2 Security Measures

sanggagakputih.blogspot.com

1

4.1 Computer Ethics
4.1 Computer Ethics

4.1.1 Intellectual Property

sanggagakputih.blogspot.com

2
2
LEARNING OUTCOMES :
LEARNING OUTCOMES :
  • At the end of this topic, students should

be able to:

Define Intellectual Property.

Identify types of Intellectual Property.

Describe the importance of

Intellectual Property.

Computer Ethics
Computer Ethics
  • Computer ethics is a rules or guidelines that used to control computer users.

Computer Ethics  Computer ethics is a rules or guidelines that used to control computer users.
Computer Ethics  Computer ethics is a rules or guidelines that used to control computer users.

sanggagakputih.blogspot.com

4

Intellectual Property
Intellectual Property
Definition :
Definition :

Unique and original works such as

ideas, inventions, literary and

artistic works, processes, names and logos.

Refer to the creation of mind used in commerce.

e l Intellectual Property l e c Categories : t u a C l T o
e
l
Intellectual Property
l
e
c
Categories :
t
u
a
C
l
T
o
r
P
P
p
a
a
r
y
d
t
o
r
e
e
p
i
m
n
e
g
a
t
h
r
r
t
t
k
y
sanggagakputih.blogspot.com

6

(1) Patent
(1) Patent

Patent is an exclusive right granted for an

invention

Invention → a product or a process that provides a new way of doing

something, or offers a new technical solution to a problem.

sanggagakputih.blogspot.com
sanggagakputih.blogspot.com

(1) Patent e.g: Nokia Handphone

8

(2) Trademark
(2) Trademark

A distinctive sign which identifies certain goods or services.

Examples :

LOGO

SIGN

SLOGAN

Color

DESIGN

(2) Trademark • A distinctive sign which identifies certain goods or services. Examples : LOGO SIGN

sanggagakputih.blogspot.com

9

(2) Trademark - Logo
(2) Trademark - Logo
(2) Trademark - Logo sanggagakputih.blogspot.com 10
(2) Trademark - Logo sanggagakputih.blogspot.com 10

sanggagakputih.blogspot.com

10

(2) Trademark - Sign
(2) Trademark - Sign
(2) Trademark - Sign sanggagakputih.blogspot.com 11
(2) Trademark - Sign sanggagakputih.blogspot.com 11
(2) Trademark - Sign sanggagakputih.blogspot.com 11
(2) Trademark - Slogan
(2) Trademark - Slogan

I'm loving it

Connecting People

Finger Lickin' Good

(2) Trademark - Slogan  I'm loving it  Connecting People  Finger Lickin' Good 
(3) Copyright
(3) Copyright

A legal term describing rights given to creators for their literary and artistic works.

(3) Copyright A legal term describing rights given to creators for their literary and artistic works

sanggagakputih.blogspot.com

13

(3) Copyright
(3) Copyright
(3) Copyright literary works - novels, poems, plays, reference works, newspapers, computer programs, databases, films, musical

literary works - novels, poems, plays,

reference

works,

newspapers,

computer

programs, databases, films, musical compositions, and choreography

artistic

works

photographs,

advertisements,

-

paintings, drawings,

sculpture,

architecture,

maps

and

technical

drawings

sanggagakputih.blogspot.com

14

Importance of Intellectual Property
Importance of Intellectual
Property
  • To

protect

any

created

by

original

individual

work

that

person/

company for example, image,

drawing, lyric, publishing and so on.

  • Preserve the features and processes that make things work. This lets inventors profit from their inventions.

SUMMARY
SUMMARY
  • Define Intellectual Property.

  • Identify

Property.

types

of

Intellectual

SUMMARY  Define Intellectual Property.  Identify Property. types of Intellectual 16  Describe the importance

16

  • Describe the importance of

Intellectual Property.

sanggagakputih.blogspot.com

4.0 COMPUTER ETHICS AND SECURITY
4.0 COMPUTER ETHICS
AND SECURITY
  • 4.1 Computer Ethics 4.1.1Intellectual Property

4.2 Computer Security 4.2.1 Computer Security Risks
4.2 Computer Security
4.2.1 Computer Security Risks

4.2.2 Security Measures

Computer Security Risks sanggagakputih.blogspot.com 18
Computer Security Risks
Computer Security Risks

LEARNING OUTCOMES:

LEARNING OUTCOMES:  At the end of this topic, students should be able to:  Define
  • At the end of this topic, students should be able to:

    • Define computer

security risks.

  • Identify types of security risks.

DEFINITION Computer Security Risks any event or action that could cause a loss of or damage
DEFINITION Computer Security Risks
DEFINITION
Computer Security Risks

any event or action

DEFINITION Computer Security Risks any event or action that could cause a loss of or damage

that could cause

a loss of or damage to

computer hardware, software, data,

information, or

processing

capability.

sanggagakputih.blogspot.com

20

Types of Computer Security Risks

Types of Computer Security Risks Internet and network attack Unauthorized access and use Hardware theft Software
Internet and network attack Unauthorized access and use Hardware theft Software theft Information theft System failure
Internet and network attack
Unauthorized access and use
Hardware theft
Software theft
Information theft
System failure
sanggagakputih.blogspot.com

21

MALWARE
MALWARE
DENIAL OF SERVICE ATTACKS
DENIAL OF SERVICE ATTACKS
MALWARE DENIAL OF SERVICE ATTACKS Internet and network attacks CLICKJACKING SPOOFING sanggagakputih.blogspot.com PACKET SNIFFING 22
MALWARE DENIAL OF SERVICE ATTACKS Internet and network attacks CLICKJACKING SPOOFING sanggagakputih.blogspot.com PACKET SNIFFING 22
Internet and network attacks
Internet and
network attacks
MALWARE DENIAL OF SERVICE ATTACKS Internet and network attacks CLICKJACKING SPOOFING sanggagakputih.blogspot.com PACKET SNIFFING 22
MALWARE DENIAL OF SERVICE ATTACKS Internet and network attacks CLICKJACKING SPOOFING sanggagakputih.blogspot.com PACKET SNIFFING 22
MALWARE DENIAL OF SERVICE ATTACKS Internet and network attacks CLICKJACKING SPOOFING sanggagakputih.blogspot.com PACKET SNIFFING 22
CLICKJACKING
CLICKJACKING
SPOOFING
SPOOFING

sanggagakputih.blogspot.com

PACKET SNIFFING
PACKET SNIFFING

22

Internet and network attacks Types of malware
Internet and network attacks
Types of malware
Malware Malwa re
Malware
Malwa
re

sanggagakputih.blogspot.com

23

Internet and network attacks

Internet and network attacks Symptoms Malware • Programs or files do not work properly • Unknown
Symptoms Malware
Symptoms Malware

• Programs or files do not work

properly

• Unknown programs or files

mysteriously appear

• System properties change • Operating system does not start up • Operating system shuts down

unexpectedly

Operating system runs much slower than usual

• Available memory is less than expected • Files become corrupted • Screen displays unusual message or image

• Music or unusual sound plays randomly • Existing programs and files disappear

Internet and network attacks

Internet and network attacks 1. Worm is a program that copies itself repeatedly, for example in
1. Worm
1. Worm

is a program that copies itself repeatedly, for

example in memory or on a network, using up resources and possibly shutting down the

computer or network.

sanggagakputih.blogspot.com

25
25

Internet and network attacks

Internet and network attacks 2. Computer Virus  is a potentially damaging  it can spread
2. Computer Virus
2. Computer Virus

is a potentially damaging

it can spread throughout and may

computer program that affects, or

damage files and system software,

infects, a computer negatively by

including the operating system.

altering the way the computer

works without the user’s

 

knowledge or permission.

sanggagakputih.blogspot.com

26
26

Internet and network attacks

How a Virus Can Spread through an E-Mail Message Step 1 Unscrupulous programmers create a virus
How a Virus Can Spread through an E-Mail Message
Step 1
Unscrupulous programmers
create a virus program that
deletes all files. They hide the
virus in a word processing
Step 2
document and attach the
They send the e-mail message
document to an e-mail
message.
to thousands of users around
the world.
Step 3a
Some users open the attachment and
their computers become infected with
the virus.
Step 3b
Other users do not recognize the name of the sender of the e-
mail
message. These users do not open the e-mail message —
instead
sanggagakputih.blogspot.com
27
they immediately delete the e-mail message and continue using
their
computers. These users’ computers are not infected with the
virus.

Internet and network attacks

3. Trojan horse
3. Trojan horse

Is a program that hides within or looks like a legitimate program. It does not replicate itself

to other computers.

it can spread throughout and may damage files and

system software, including

the operating system.

sanggagakputih.blogspot.com

Internet and network attacks 3. Trojan horse  Is a program that hides within or looks

28

Internet and network attacks

Internet and network attacks 4. Rootkit  Is a program that hides in a computer and
4. Rootkit
4. Rootkit

Is a program that hides in a computer and allows someone from a remote location to take full control of the computer.

The rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer

sanggagakputih.blogspot.com

Internet and network attacks

5.Botnet / zombie army Definition : a group of compromised computers connected to a network such
5.Botnet / zombie army
Definition : a group of compromised computers connected to a network such as the Internet
that are used as part of a network that attacks other networks, usually for nefarious purposes.
A bot is a program that performs a repetitive task on a network.
Cybercriminals install malicious bots on unprotected computers to create a
botnet, also called a zombie army. The perpetrator then uses the botnet to
send spam via e-mail, spread viruses and other malware, or commit a
distributed denial of service attack,
sanggagakputih.blogspot.com
30

Internet and network attacks

6.Back doors Definition : a program or set of instructions in a program that allow users
6.Back doors
Definition : a program or set of instructions in a program that allow users to bypass
security controls when accessing a program, computer, or network
they often install a back door or modify an existing program to include a
back door, which allows them to continue to access the computer
remotely without the user’s knowledge.
sanggagakputih.blogspot.com
31

Internet and network attacks

Internet and network attacks 7.spyware  Spyware is a program placed on a computer without the
7.spyware
7.spyware

Spyware is a program placed on a computer without the user’s knowledge that secretly collects information about the user.

 Spyware is a program placed on a computer without the user’s knowledge that secretly collects

Types of spyware called Web bug, is hidden on Web pages or in e-mail messages

in the form of graphical images.

8. Adware
8. Adware

Adware

is

a program that displays

an online

advertisement in a banner or pop-

sanggagakputih.blogspot.com

window on Web pages, e-mail messages, or other Internet services.

up

Internet and network attacks

Symptoms : spyware/ adware
Symptoms : spyware/ adware

You may see many more pop-up advertising windows than usual

Your web browser may go to sites you do not expect

Several other symptoms could indicate spyware or another type

of infection, such as a virus:

Your system may seem sluggish or become unstable

Network traffic on your system may increase

sanggagakputih.blogspot.com

Internet and network attacks

Internet and network attacks Denial of Service Attacks (DoS)  Denial of service attacks or DoS
Denial of Service Attacks (DoS)
Denial of Service Attacks
(DoS)
  • Denial of service attacks or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.

  • Zombie - A compromised computer, is one whose owner is unaware the computer is being controlled remotely by an outsider (zombie Army/ botnet).

  • Symptoms

The victim computer network slows down considerably.

unresponsive or unavailable, blocking legitimate visitors from accessing the network.

sanggagakputih.blogspot.com

Internet and network attacks

Internet and network attacks Spoofing Definition: a technique intruders use to make their network or Internet
Spoofing
Spoofing

Definition: a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network.

E-mail spoofing commonly is used for virus hoaxes, spam, and phishing scams, IP spoofing, occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source. The victim may

provide confidential information or download files containing viruses, worms,

or other malware.

 

sanggagakputih.blogspot.com

35

Internet and network attacks

Internet and network attacks Spoofing Phishing scam -is a scam in which a perpetrator sends an
Spoofing
Spoofing

Phishing scam -is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information

sanggagakputih.blogspot.com
sanggagakputih.blogspot.com

36

Internet and network attacks

Spoofing
Spoofing

Spam - is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Spam is Internet junk mail

sanggagakputih.blogspot.com 37
sanggagakputih.blogspot.com
37

Internet and network attacks

Internet and network attacks Pharming Is a scam, similar to phishing, where a perpetrator attempts to
Pharming
Pharming

Is a scam, similar to phishing, where a perpetrator attempts to obtain your

personal and financial information, except they do so via spoofing.

That is,

when you type

a Web address

in

the Web browser,

you are

redirected to a phony Web site that looks legitimate.

sanggagakputih.blogspot.com

Internet and network attacks

Packet Sniffing
Packet Sniffing
  • When you transmit data over the internet, the data is not sent in one continuous stream.

To keep the performance of the internet as high as possible, the data is cut into pieces These pieces are called “packets”. A Packet Sniffer is a program that gathers information from these packets of data as it travels through the network It may gather information like user names, passwords and other confidential data. Cable modem users are especially vulnerable to this kind of program.

sanggagakputih.blogspot.com

Internet and network attacks

Internet and network attacks ClickJacking  Object that can be clicked on a Web site, such
ClickJacking
ClickJacking

Object that can be clicked on a Web site, such as a button,

image, or link, contains a malicious program.

Unauthorized Access and Use Unauthorized access  The use of a computer or network without permission.

Unauthorized Access

and Use
and Use
Unauthorized Access and Use Unauthorized access  The use of a computer or network without permission.

Unauthorized access

The use of a computer or network without permission.

Unauthorized use

The use of a computer or its data for unapproved or possibly illegal activities.

sanggagakputih.blogspot.com

41

Hardware Theft and

Vandalism
Vandalism
Hardware Theft and Vandalism Hardware theft  Is the act of stealing computer equipment. Hardware vandalism

Hardware theft

Is the act of stealing computer equipment.

Hardware vandalism

The act of defacing or destroying computer equipment.

sanggagakputih.blogspot.com

42

Software Theft  Steals software media  Intentionally erases programs,  Illegally copies a program (
Software Theft
Software Theft

Steals software media Intentionally erases programs,

Illegally copies a program (Software Piracy- the unauthorized and illegal

duplication of copyrighted software.),

Illegally registers and/or activates a program.

sanggagakputih.blogspot.com

Information Theft
Information Theft

Occurs when someone steals personal or confidential information.

If stolen, the loss of information can cause as much damage as (if not more

than) hardware or software theft.

sanggagakputih.blogspot.com

44

System Failure

 Is the prolonged malfunction of a computer. System failure also can cause loss of hardware,
Is the prolonged malfunction of a computer. System failure also
can cause loss of hardware, software, data, or information.
Effect
System failure
Aging hardware; natural disasters such as fires, floods, or
hurricanes;
Electrical power variations can cause loss of data and loss
of equipment. (Noise, undervoltage, overvoltage, or
power surge[also called spike]
sanggagakputih.blogspot.com
45

Internet and network attacks

Term :
Term :

Unscrupulous programmers write malware and then test it to ensure it can deliver its payload.

The payload is the destructive event or prank the program is intended to deliver.

Cookies a small text file that a Web server stores on your computer.Cookie files typically

contain data about you, such as your user name or viewing preferences.

Malware is a programs that act without a user’s knowledge and deliberately alter the computer’s operations.

Denial of service attacks or DoS attack, is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.

Internet and network attacks

Term :
Term :

A more devastating type of DoS attack is the DDoS (distributed DoS) attack, in which a zombie army (botnet) is used to attack computers or computer networks.

Zombie - A compromised computer, is one whose owner is unaware the computer is being controlled remotely by an outsider.

Spam - is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. Spam is Internet junk mail

Phishing scam -is a scam in which a perpetrator sends an official looking e-mail message that attempts to obtain your personal and financial information

CONCLUSION

Conclusion

Conclusion

Conclusion

Malware delivers its payload on a computer in a variety of ways:

when a user

(1) opens an infected file, (2) runs an infected program, (3) boots the computer with infected removable media inserted in a drive or plugged in a port, (4) connects an unprotected computer to a network, or

(5) when a certain condition or event occurs, such as the computer’s

clock changing to a specific date.

sanggagakputih.blogspot.com

48

4.0 COMPUTER ETHICS AND SECURITY

4.0 COMPUTER ETHICS AND SECURITY 4.1 Computer Ethics 4.1.1 Intellectual Property 4.2 Computer Security 4.2.1 Computer
  • 4.1 Computer Ethics

    • 4.1.1 Intellectual Property

4.2 Computer Security 4.2.1 Computer Security Risks 4.2.2 Security Measures sanggagakputih.blogspot.com
4.2 Computer Security
4.2.1
Computer Security Risks
4.2.2
Security Measures
sanggagakputih.blogspot.com

49

LEARNING OUTCOMES :
LEARNING OUTCOMES :
  • At the end of this topic, students should be able to:

Identify different ways to overcome security risks.

sanggagakputih.blogspot.com

50

A n n t Security Measures t i i s C v S p r i
A
n
n
t
Security Measures
t
i
i
s
C
v
S
p
r
i
y
F
y
e
H
r
w
i
p
u
c
u
a
r
t
m
s
u
r
e
o
a
e
w
g
r
n
a
r
i
A
l
D
a
s
a
t
l
p
p
t
h
y
e
a
y
M
c
B
t
a
e
:
c
a
A
k
s
w
u
a
p
u
sanggagakputih.blogspot.com
51
r
r
e
e
n
e

Internet and network attacks :

SECURITY MEASURES

[Worm, Computer Virus, Trojan Horse and Rootkit]

Install an antivirus program and a personal firewall.

Internet and network attacks :

SECURITY MEASURES

[Worm, Computer Virus, Trojan Horse and Rootkit]

An

antivirus

program

protects

a

computer

against

viruses

found

in

memory,

on

storage

media,

or

on

incoming files.

Internet and network attacks :

SECURITY MEASURES

[Worm, Computer Virus, Trojan Horse and Rootkit]

Popular Antivirus Programs :

  • AVG Anti-Virus

  • Avast Anti-virus

  • BitDefender Anti-Virus

  • F-Secure Anti-Virus

  • Kaspersky Anti-Virus

  • McAfee VirusScan

  • Norton Antivirus

Internet and network attacks : SECURITY MEASURES [Worm, Computer Virus, Trojan Horse and Rootkit] Popular Antivirus

sanggagakputih.blogspot.com

54

Internet and network attacks :

SECURITY MEASURES

[Worm, Computer Virus, Trojan Horse and Rootkit]

A personal firewall is a utility program that detects and protects a personal

computer and its data from unauthorized

intrusions.

sanggagakputih.blogspot.com
sanggagakputih.blogspot.com

55

Internet and network attacks :

SECURITY MEASURES

[Worm, Computer Virus, Trojan Horse and Rootkit]

Stand-Alone Personal Firewall Software :

  • BitDefender Internet Security

  • CA Personal Firewall

  • McAfee Internet Security

  • Norton Personal Firewall

  • Webroot Desktop Firewall

  • ZoneAlarm Pro

sanggagakputih.blogspot.com

56

Internet and network attacks :

SECURITY MEASURES

[Worm, Computer Virus, Trojan Horse and Rootkit]

Don't start a

computer with removable media in

the drives or ports.

Internet and network attacks : SECURITY MEASURES [Worm, Computer Virus, Trojan Horse and Rootkit] Don't start

Internet and network attacks :

SECURITY MEASURES

[Worm, Computer Virus, Trojan Horse and Rootkit]

Don't open an e-mail

attachment unless you are expecting the attachment and it is from a trusted source.

Internet and network attacks : SECURITY MEASURES [Worm, Computer Virus, Trojan Horse and Rootkit] Don't open

sanggagakputih.blogspot.com

58

Internet and network attacks :

SECURITY MEASURES

[Worm, Computer Virus, Trojan Horse and Rootkit]

Stay informed about any new virus alert or virus hoax.

Internet and network attacks : SECURITY MEASURES [Worm, Computer Virus, Trojan Horse and Rootkit] Stay informed
Internet and network attacks : Spyware and Adware
Internet and network attacks :
Spyware and Adware

SECURITY MEASURES

Spyware remover : Program that detects and deletes spyware and other similar programs

on a user's computer.

Examples :

  • Ad-Aware

  • Spy Sweeper

  • Windows Defender

Internet and network attacks : Spyware and Adware SECURITY MEASURES Spyware remover : Program that detects

SECURITY MEASURES

Internet and network attacks : Botnets, DoS Attacks, Back Doors, and Spoofing
Internet and network attacks :
Botnets, DoS Attacks, Back Doors, and Spoofing

A firewall is hardware and/or software that protects a network's resources from intrusion by users

on another network such as the

Internet.

SECURITY MEASURES

Internet and network attacks : Botnets, DoS Attacks, Back Doors, and Spoofing
Internet and network attacks :
Botnets, DoS Attacks, Back Doors, and Spoofing
sanggagakputih.blogspot.com
sanggagakputih.blogspot.com

62

Information Theft
Information Theft

SECURITY MEASURES

Cryptography : Technology of encoding information so it can only be read by authorized individuals.

  • Encryption : Process of converting

readable

data into unreadable characters

to prevent unauthorized access.

  • Decryption : Process to decode encrypted

data.

sanggagakputih.blogspot.com

63

Information Theft
Information Theft

SECURITY MEASURES

sanggagakputih.blogspot.com 64
sanggagakputih.blogspot.com
64

SECURITY MEASURES

Hardware/Software/Information theft & System failure
Hardware/Software/Information theft
& System failure

A backup is a duplicate of a file, program, or disk that can be used if

the original is lost, damaged, or destroyed.

SECURITY MEASURES Hardware/Software/Information theft & System failure A backup is a duplicate of a file, program,

sanggagakputih.blogspot.com

65

SECURITY MEASURES

Unauthorized Access and Use
Unauthorized Access and Use
Identification & Authentication sanggagakputih.blogspot.com
Identification & Authentication
sanggagakputih.blogspot.com

66

System failure
System failure

SECURITY MEASURES

Two ways to protect from system failures

caused by electrical power variations include

surge protectors and  uninterruptible power supplies (UPS) 
surge protectors and
uninterruptible power supplies (UPS)
System failure SECURITY MEASURES Two ways to protect from system failures caused by electrical power variations

sanggagakputih.blogspot.com

System failure SECURITY MEASURES Two ways to protect from system failures caused by electrical power variations

67

SECURITY MEASURES

Human Aspects : Awareness
Human Aspects : Awareness
  • Provide in-house training for employees or staff in computing to expose them in

computer security.

  • Make a routine check to update from new

virus, worm or other malicious threat.

  • Make sure that do not make any mistake in handling a computer and information.

sanggagakputih.blogspot.com

68

Summary
Summary

Computer Security Risks

 

Security Measures

Internet and network attacks :

Antivirus program

worm, computer virus, trojan horse and rootkit

Personal firewall

Internet and network attacks :

Spyware remover

spyware and adware

Adware remover

Internet and network attacks :

Firewall

Botnet, DoS attack, Back Door and Spoofing

 

Unauthorized access and use

Firewall

Identification

sanggagakputih.blogspot.com

Authentication

69

Summary
Summary

Computer Security Risks

Security Measures

Hardware/Software/Information theft and System failure

  • Data backup

Information theft

  • Cryptography

System failure

  • Surge protector

  • Uninterruptible Power Supplies

***** Human Aspects : Awareness

****

QUESTION 1

1. Qausar works as an Information System Officer

in Takaful Insurance Company. One of his responsibilities is to make sure all

corporate

protected and

clients' data and information

safe.

  • a) State the definition of Computer Security Risks.

  • b) State one (1) example of security risk.

  • c) Identify two (2) security measures those are suitable to overcome the security risk mentioned in 1 b).

sanggagakputih.blogspot.com

  • d) Name the technology that encodes

71

information so it can only be read by authorized individuals.

QUESTION 2

  • 2. Lately Dr. Yassin has found that his computer

has been illegally access by someone. In

order to overcome this problem, he has created a

logon

computer.

username and password for his

Furthermore, his computer

has been infected codes.

with various malicious

  • a) State the name of the action underlined in

the

paragraph above.

  • b) Give one (1) advantage of the action taken.

  • c) Name one (1) type of malicious codes that has

sanggagakputih.blogspot.com

possibly attacked his computer.

72

  • d) Identify one (1) security measures that he can take to protect his computer from malicious

QUESTION 3

  • a. Computer viruses, worms, Trojan horses, and

rootkits are classified as

____

,

which are

programs that act without a

user’s knowledge computer’s operations.

and deliberately alter the

  • b. is a technique intruders use to make their

____

network or Internet transmission appear

legitimate computer or network.

to a victim

  • c. A personal

sanggagakputih.blogspot.com

is a utility program that detects

73

____ and protects a personal computer and its data from unauthorized access.

QUESTION 3

  • d. occurs when someone steals personal or confidential information.

____

  • e. A system computer.

____

is the prolonged malfunction of a

  • f. A(n)

____

is a device that contains surge

more batteries that temporary or

protection circuits and one or can provide power during a permanent loss of power.