



Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
Material Type: Notes; Professor: Price; Class: Computer Concepts-Hybrid*; Subject: Computer Science; University: Mississippi Gulf Coast Community College; Term: Unknown 1989;
Typology: Study notes
1 / 6
This page cannot be seen from the preview
Don't miss anything!
I. Scope of the Problem CIYF 11. Lay the groundwork for your lecture by defining computer security risk as any event, action, or situation—intentional or not—that could lead to the loss or destruction of computer systems or the data they contain. Distinguish risks from computer crimes and define cybercrime and cyberlaw. II. Computer Crime and Cybercrime: Tools and Tricks CIYF 11.
Explain that unauthorized access is the most publicized computer security problem. Ask students to recall the discussion on authentication wherein systems are protected from unauthorized guests by requiring user IDs and passwords. List and briefly summarize several techniques used to obtain passwords:
Explain that most computer crime is done by employees. Define salami shaving as a process where small amounts of money are taken from many accounts and diverted elsewhere. Define data diddling as illegal or unauthorized data alteration.
E-mail messages are forged to disguise their origin. Point out that “anonymizer” sites and programs are often used to strip traceable information from messages.
Chapter 11 Lecture Notes
Explain that computer crimes are initiated by intruders who use programs that automatically search for vulnerabilities in computer systems. One such program is SATAN.
Teaching Tip : While much of the information in this chapter is interesting, the section on Computer Viruses is where you should spend the bulk of your lecture time. Define computer virus as a program that requires a host and is designed to make a system sick, just like a real virus. Use the analogy to continue the discussion about computer viruses, informing your students that they can be spread from computer to computer, and that they can replicate themselves. Explain that some viruses are categorized as harmless pranks, while others are far more malicious. Describe three types of viruses as:
Explain that viruses are not the only types of nefarious programs that can destroy your system. Briefly explain the terms time bomb (logic bomb) , worm , and Trojan horse. III. Meet the Attackers CIYF 11.
Explain that there are various types of attackers who invade computer systems, not all of whom intend harm. This section introduces categories of attackers.
Chapter 11 Lecture Notes
Note that it is interesting that over 40 percent of all computer crimes go unreported because companies are afraid of adverse publicity damaging their reputation or business.
Denial of Service (DoS) attacks deserve some discussion due to the fact that they have affected every one of us, even if we were not aware of it. Large companies such as Yahoo!, Amazon.com, and Microsoft have all been victims of DoS attacks. Web Link : Refer students to the article “Denial of Service ‘Nuke’ Attacks” (www.irchelp.org/irchelp/nuke/) for more information about and suggestions for defending against DoS attacks. V. Playing It Safe CIYF 11. This section discusses several measures that safeguard computer systems.
Protect your computer against power surges and outages by saving your work often and installing an uninterruptible power supply (UPS) on your system.
Use a secure password and user ID, and never give them out to anyone. Watch that someone is not “shoulder surfing” when you log in to your computer. Teaching Tip : If you did not use the Web Link provided for the Tips for Obtaining Passwords section, you can use it now. Web Link : Direct students who find themselves “password-challenged” to the Secure Password Generator (www.winguides.com/security/password.php) for quick and free random password generation.
Define firewall as a computer program that permits an organization’s internal computer users to access the external Internet, while placing severe limits on the ability
Chapter 11 Lecture Notes of outsiders to access internal data. Use Figure 11.15 to illustrate the point. Mention that it is possible to install a personal firewall on your home computer. Web Link : Refer students to Symantec for information about the Norton Personal Firewall (www.symantec.com/sabu/nis/npf/).
Explain that the process of encryption is where original data is scrambled using a key, and the data is unscrambled by the receiver of the message using a key. Note that encryption will be covered in greater detail in Chapter 12.
Explain that anti-virus programs are an important tool in your arsenal in preventing or spreading a virus. Identify the simple guidelines to help students reduce the risk of a virus attack: Always check your disks for viruses Always scan downloaded files for viruses Disable macros in productivity programs such as Microsoft Word Teaching Tip : Recommend that students take virus protection seriously, keep their virus protection software up-to-date, and follow the simple guidelines.
Explain how a backup is accomplished, and the difference between full and incremental backups. Mention that every organization should have a disaster recovery plan in place. Web Link : Refer students to Microsoft’s explanation of the backup utility in Windows XP (www.microsoft.com/windowsxp/pro/using/howto/gettingstarted/guide/ backup.asp) for a clear description of the backup process. Class Exercise : Lead students in a discussion about how to develop a disaster recovery plan. Encourage them to think of their own computer and the steps they would need to take to recover from a house fire, earthquake, or similar catastrophe. Have a volunteer write ideas and suggestions on the board as students brainstorm. Web Link : For an easy-to-use guide on creating a disaster recovery plan, visit Hewlett-Packard (www.hp.com/sbso/productivity/howto/disaster_recovery/).
Review the tips provided in the textbook for avoiding scams: Do business with established companies that you know and trust. Read the fine print. Don’t provide financial or other personal information or passwords to anyone. Be skeptical when somebody in an Internet chat room tells you about a great new company or stock.
Review the tips provided in the textbook for protecting against cyberstalkers: