Vous êtes sur la page 1sur 24

SEX

EDUCATION
Computer Security
Computer Crime
 is defined as any crime accomplished
through the knowledge or use of
computer technology
 is an act performed by a knowledgeable
computer user, sometimes referred to as
a hacker that illegally browses or steals a
company's or individual's private
information.
Types of
Computer Crimes
Software Piracy C
Piracy or the illegal duplication of R
copyrighted software is the most
common computer crime
A
C
K
Software/Hardware
Sabotage
 Another Type of computer crime is sabotage
of hardware or software
 The word sabotage comes from the early
days of industrial revolution. However,
computer saboteurs use software rather than
footwear for their destructive activities
 They uses viruses to destroy the computer
hardware and software
Hacking and Electronic Trespassing

 Hackers are people who enter corporate and


government computers using stolen passwords
and security loopholes and steal information,
transfer money to their accounts, and do a lot of
other criminal activities
 Many hackers cover their tracks and leave
without a trace; but many leave viruses and do
a lot of malicious activities like changing
passwords, shutting down or crippling the system
Computer Security
 With computer crimes on the rise,
computer security has become an
important concern for system
administrators and computers
alike.
 Computer Security refers to
protecting computer systems and
the information they contain
against unwanted access,
damage, modification or
destruction.
Computer
Security
Techniques
Physical Access Restriction
 One way to reduce the risk of security
breaches is to make sure that only authorized
personnel have access to computer
equipment.
 Organizations use number of tools and
techniques to identify authorized personnel.
The computer can perform some of this
security checks; other are used by human
security guards.
Passwords
 Arethe most common tool for restricting
access to computer systems
 Are effectively only if they are chosen
carefully . Most computer users choose
passwords that are easy to guess thus making
the job of the unauthorized user easy.
Firewalls
 A device that blocks unauthorized access to
an organization’s local area network(LAN).
 A firewall can reside on the administrative
computer(the server) that acts as the local
area network’s gateway to the Internet or it
can be a dedicated computer placed between
the local are network and the Internet, so that
the network is never in direct contact with the
Internet
Backups
 Even the tightest security system can’t guarantee absolute
protection of data
 Any complete security system must include some kind of plan
for recovering from disasters. For many systems, data and
software are backed up automatically onto disks or tapes,
usually at the end of each working day

Y201
Nakita mo grades mo
be like

Computer
Crime by
Authorized
Users
There are several ways an authorized user of a computer,
such as employee using the company’s computer, can
accomplish unauthorized and illegal objectives:
 Altering of data as it entered into the computer
 Moving of data from the system without evidence of removal
 Releasing of data from the system to unauthorized parties
 An employee with access to the company’s money-
management via computer has an opportunity for
embezzlement
 An employee on his way out may sabotage the data on his
computer, deleting customer records, bills owed, etc., leaving
a mess that could take months to straighten out
Preventing
Employee
Crime
Check References
 It is vital to call former employees and get their assessment of the
potential employee
Don’t give two week’s notice
 When firing an employee, it is common practice to give him two
week’s notice so he can begin looking for another job. In a
computer related field, though, this gives him two weeks to
sabotage data, as well as copy data to sell to a competitor
Do not give more access than necessary
 Make sure that access to crucial data such as grades and payroll
data is limited to those who must have it
Keep employees lists up to date

 Security guards get used to


seeing the same faces
everyday and may let former
employee into an
unauthorized(formerly
authorized) area because
they think he still works there.
It is important that security be
kept up to data on this kind of
personnel change
Don’ts
in
Creating
Passwords
 Do not use password that resembles SANGCALING
JUMAWAN
your username RAMIREZ
 Do not use Proper Names BOLASOC
INOCENTES
 Do not use dictionary words
 Do not use words of less than 6
characters
Here are some passwords that are almost impossible for
hackers to figure out:

 Two words run together  Logical numbers


Ex: chillax – chill/relax Ex: 1two3four5/one2three4
cosplay – costume/play 244466666
taglish – tagalog/English

 A purposely misspelled word


Ex: chillaks – chillax
costplay – cosplay
tagleash – taglish
Tips for defending
against Hackers
 Require anyone who claims they are there to service the computers to show
their identity card
 Make a policy that passwords are never to be spoken over the phone
 Make a policy that passwords are not to be left lying around near the
computers
 Implement caller ID technology. Make a list of all employee phone numbers.
When someone dials into the modern bank, hang up and compare the
number that called in with the list of “good” numbers. If the number is not on
the list, call it back and establish the connection
 Invest in a paper shredder to prevent snooping through the garbage

Vous aimerez peut-être aussi