1 / 12

Tomorrow’s Technology and You Chapter 10 Computer Security

Tomorrow’s Technology and You Chapter 10 Computer Security. “Blind faith in modern technology can be foolish, and in many cases, dangerous.” (Beekman). Chapter 10 Objectives.

Download Presentation

Tomorrow’s Technology and You Chapter 10 Computer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Tomorrow’s Technology and YouChapter 10Computer Security

  2. “Blind faith in modern technology can be foolish, and in many cases, dangerous.” (Beekman) Chapter 10Objectives Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them Describe computer backup methods and choose the best for your computer Discuss security-related issues for the future.

  3. "ANY MATERIAL DOWNLOADED THROUGH GOOGLE IS DONE AT YOUR OWN RISK... YOU WILL BE RESPONSIBLE FOR ANY DAMAGE TO YOUR COMPUTER SYSTEM OR LOSS OF DATA THAT RESULTS" http://pages.google.com/#ready Threats to Computer Data (p 360-369) Physical theft - what may get stolen? Identity theft – how does it happen? ‘Malware’ (viruses, spyware etc.) Who originates this? How does it spread? What harm does it do? ‘Hacking’ – what is it? why should we care? What is a DDoS attack? How might you be guilty of facilitating one?

  4. More Threats to Computer Data (p 382-383) Computer Failure Which is more serious, hardware or software ‘bugs’? is ‘bug-free’ software possible? ‘The bigger the system, the bigger the problem’ – so what? Reading of discarded media how? how big a problem? solution? ‘UBF’ Problems such as? What can we do? Which is the most serious cause of data loss So what?

  5. What can be done? (p 369- 376) Physical Security how? what does it not protect us from? Passwords how do we choose? remember? Still need encryption – why? Identity theft – what can we do? (p 363) Use PayPal vs credit card httpS – not enough! Why not? What else can we check? Other ideas? Firewalls what do they do? do you need one in a desktop PC at school? at work? at home? in a laptop? how do you ensure it is active in your computer?

  6. What can be done? (p 369- 376) Surge protectors & UPS - why? costs? Virus protection Updates vital – why? How can I check currency? Windows Update Ensure this is Automatic, or DIY! (or use Mac/linux!) Other ideas (p 378, plus research!) There is no 100% secure system – so? Be careful where you visit/download and… Backup!

  7. In-class Activity • Open the screen that tells you whether your virus protection is up-to-date • Take screen shot • Paste to Word, and explain why keeping this up-to-date is vital. What would you do if this is out of date? • Reply to thread for ‘In-class discussion - Week 10’, and attach the Word document. (bonus if you remember that Word format is not the best choice!)

  8. Chapter 10Objectives Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them Describe computer backup methods and choose the best for your computer Discuss security-related issues for the future.

  9. “80% of PC’s are inadequately backed up - The only cure for this kind of stupidity is a disaster.” (W.D. Riley, data security administrator, NCRI) Focus on Backup (p376) When do we backup? Just before data loss! Time triggered – how can we schedule in Windows? Change triggered – why is this better? What do we back up? whole drive? – why not? ’My Documents’ (be sure to put all your data there) What about e-mail address book? IE Favorites? and what else? What if I lose the entire drive?

  10. Focus on Backup How do we backup data? Auto (Recycle bin) – why is this not enough? Windows Backup Program vs Drag & Drop Cloud computing – how does this solve the backup problem? Any cons? Where do we backup to? USB key/CD/DVD – pros & cons? Copy to external hard drive – cost? where do we keep it? N drive at school – pros? cons? Advanced solutions RAID – can actually do on home computer – see Dell site Web-based backup services – such as? Don’t forget to practice restore! (Why?)

  11. Chapter 10Objectives Explore some of the most serious threats to the security of computer systems and discuss what can be done to protect against them Describe computer backup methods and choose the best for your computer Discuss security-related issues for the future.

  12. “The delicate balance” between security & privacy • examples? • what can we do to affect the ‘balance’? • Will Computers Be Democratic? • What does Lech Walesa say? Who was he? • Examples of this in action? • Is it always true? is this always a good thing? • Will the Global Village Be a Community? • What did Davis and Davidson say? • What is threatening this openness today? • What do you foresee? What can we do? Security-related Issues for the Future.(p377-390)

More Related