Chp 11 Section 4-5 Notes

Report
Chapter 11 – Section 4-5

Techniques use to Access the network
 War Driving or access point mapping
▪ Individuals attempt to detect wireless network via their
notebook computer or mobile device while driving a
vehicle through areas they suspect have a wireless
network
 War Flying
▪ Use airplanes instead of vehicle to detect unsecured
wireless network
How can I ensure my wireless communication is
secure?
 Firewalls
 Secure your wireless access point (WAP)
 WiFi Protected Access (WPA)
 Authenticate network users and provide advanced
encryption techniques
 802.11i (WPAs)
 Conforms to the government security standards and
uses more sophisticated encryption techniques the
WPA
What are some health concerns of computer
use?
Computer addiction-when computer
consume entire social
Repetitive strain injury (RSI)
Injury or disorder of the muscles, nerves,
tendons, ligaments, and joints
Computer vision syndrome (CVS)
eye and vision problems
Tendonitis – inflammation
of a tendon due to
repeated motion
Carpal tunnel syndrome –
inflammation of the nerve that
connects the forearm to the palm

What precautions can prevent tendonitis or
carpal tunnel syndrome?
 Spread fingers apart for several seconds while
keeping wrist straight
 Gently push back fingers and then thumb
 Dangle arms loosely at sides and shake arms and
hands
What is Ergonomics?
An applied science devoted to incorporating
comfort, efficiency, and safety into the
design of items in the workplace.
What are computer ethics?
Moral guidelines that govern use of computers and information systems
Unauthorized use
of computer
&Networks
Software theft
(piracy)
Information
accuracy
Intellectual
property rights
Codes of conduct
Information
privacy
Green
Computing
What is information accuracy?


Accuracy of computer input
Altering photo
 National Press Photographer Association oppose

What are intellectual Property (IP) and
Intellectual property rights?
 Intellectual Property
▪ Refer to unique & original work such as ideas,
inventions, art, writing, processes, company and
product name and logos.
 Intellectual Property Rights
▪ The rights to which creators are entitled for their work
IT Code of Conduct
What is an IT code of
conduct?
 Written guideline that
helps determine whether
computer action is ethical
 Employers can distribute
to employees
1.
Computer may not be used to harm other
people.
2. Employee may not interfere with other’s
computer work.
3. Employees my not meddle in other’s
computer files.
4. Computers may not be used to steal
5. .Computers may not be used to bear false
witness.
6. Employees may not copy or use software
illegally.
7. Employees may not use others’ computer
resources without authorization
8. Employees may not use others’
intellectual property as their own.
9. Employees shall consider the social
impact of program and systems they
design.
10. Employees always should use computers
in a way that demonstrates and respect for
fellow humans.

What is Green Computing?
 Involves reducing the electricity and
environmental waste while using a computer.
 ENERGY STAR program
▪ Develop by US Department of Energy and US
Environmental Protection Agency (EPA)
▪ Help reduce the amount of electricity used by computer
and related devices

What is Information Privacy?
 Right of individual and companies to deny or
restrict the collection and use of information
about them
 Difficult to maintain today because data is stored
online

What is an electronic profile?
 Data collected when you fill out forms on the Web
 Merchant sell your electronic profile
 Often you can specify whether you want personal
information distributed
What is a Cookie?
User
Preferences
Small text file on
your computer that
contains data about
you
How
regularly
you visit
Web site
Interest
and
browsing
habits
Some Web sites
sell or trade
information
stored on your
cookie
Set browser to
accept cookies,
prompt you to
accept cookies or
disable cookies
What is Spam?
 Unsolicited e-mail message or newsgroup,
posting sent to many recipients or
newsgroups at once.
 Internet Junk mail
How can you control spam?
Service that
blocks email
messages from
designated
source
E-mail filtering
Collects spam
in central
location that
you can view
anytime
Anti-spam program
Attempts
to remove
spam
Sometimes
removes valid
email
messages
What is Phishing and Pharming?
Phishing
Scam in which a perpetrator
sends an official looking
email message that
attempts to obtain your
personal and financial
information
Pharming
Similar as phishing but they
attempts to obtain your
personal and financial
information through
spoofing
What are Spyware and Adware?
 Spyware is a program placed on a
computer without the user’s knowledge
that secretly collects information about
the user
 Adware is a program that displays an
online advertisement
Some Privacy laws that have been enacted

1970 Fair Credit Reporting Act
 Limits the right of other viewing a credit report to only
those with a legitimate business need.

1984 Computer Fraud and Abuse Act
 Outlaws unauthorized access of federal government
computers

1998 Children’s Online Privacy Protection Act (COPPA)
 Requires Web sites protect personal information of
children under 13 years of age
What is Social Engineering?

Gaining unauthorized access or obtaining
confidential information by taking advantage
of the trusting human nature of some victims
and naivety of other
What is Employee Monitoring?

Involves the use of computers to observe,
record, and review an employee’s use of a
computer
What is content filtering?

Process of restricting access to certain
material
Internet Content Rating Association (ICRA) provides
rating system of Web content
 Web filtering software restricts access to specific
sites


similar documents