Chapter 12. Computer Security and Risks. Topics. On-line Outlaws: Computer Crime Computer Security: Reducing Risks Security, Privacy, Freedom, and Ethics: The Delicate Balance Security and Reliability.
Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.
Computer Security and Risks
On-line Outlaws: Computer Crime
Computer Security: Reducing Risks
Security, Privacy, Freedom, and Ethics: The Delicate Balance
Security and Reliability
“Computers are power, and direct contact with power can bring out the best or worst in a person.”
Former computer criminal turned corporate programmer
Sabotage of software can include:
These are referred to as a virus.
How software sabotage works:
Virus detection software locates and removes viruses
Cliff Stoll discovered an international computer espionage ring because of a .75 cent accounting error.Hacking and Electronic Trespassing
A variety of security techniques are used to protect computer systems
Passwords are the most common tool for restricting access to computer system
These security systems reduce or prohibit the interception of messages between computers:
“In this age of advanced technology, thick walls and locked doors cannot guard our privacy or safeguard our personal freedom.”
Lyndon B. Johnson