1 / 9

Basics, Ethics, & Security

Basics, Ethics, & Security. FTP & Telnet. FTP-File Transfer Protocol Standard way of moving files over a network. Varied clients including Secure FTP, Web Browsers, and WS-FTP. Telnet Opens a session on a remote computer to perform tasks. Varied clients including Secure Shell. SECURE SHELL.

lahela
Download Presentation

Basics, Ethics, & Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Basics, Ethics, & Security

  2. FTP & Telnet • FTP-File Transfer Protocol • Standard way of moving files over a network. • Varied clients including Secure FTP, Web Browsers, and WS-FTP. • Telnet • Opens a session on a remote computer to perform tasks. • Varied clients including Secure Shell.

  3. SECURE SHELL • Graphical interface for TELNET and FTP. • Uses more secure communication than other utilities. • Allows some functions to be done in Windows style.

  4. EMAIL • Electronic mail. • Varied clients including PINE (in telnet) and Web Browsers.

  5. CLIENT-SERVER • Allows remote user to interact as if local. • Used when bandwidth is low or when resources must be centralized (like software). • Examples include Citrix, Telnet.

  6. Security: Viruses/Trojans • A virus is a piece of software that attaches itself to a legitimate program and gets executed with the program, installing itself in memory and reproducing. • A Trojan is a program meant to distract the user while damage is done to the computer. • Threats: • Data corruption. • System shutdown. • Remedies: • Stick with commercial software purchased on CDs. • Install antivirus software and update the definitions regularly. • Only open e-mail attachments if you already know their content. • Back up your data regularly.

  7. Security: Spyware • Software that performs tasks on your computer, typically without your consent. • Threats: • Unwanted pop-up ads. • Collects personal information. • Computer slows, crashes. • Remedies: • Install anti-spyware software. • Only download from sites you trust. • Research suspect programs with engines, friends.

  8. Security: Hackers • People who look for a computer with a security hole for the purpose of exploiting the hole. This type of person is looking for a thrill, has something to prove or is simply acting with malice. • Threats: • Pick up your personal information. • Use your accounts. • Corrupt your computer with viruses, etc. • Remedies: • Set up a firewall. • Encrypt private data. • Update patches regularly.

  9. Computing Ethics: Norms • Ethical norms extend to computer usage. • Some are minor issues, such as not using reply-all to mass emails, no flaming. • More important issues: consideration of Privacy and respect of Intellectual Property.

More Related