Discovering Computers 2010: - Living in A Digital World
Discovering Computers 2010: - Living in A Digital World
Computers 2010
•Living in a Digital
World
Why Be Concerned about Network and
Internet Security?
Crackers
Cracking is the act of breaking into other computer systems.
This can be done with malicious intent, for financial profit, or for
fun.
The opposite of the white hat, a black hat or cracker breaks into
systems illegality for personal gain, vandalism (damage), or bragging
rights.
A cracker is a one who uses their proficiency for personal gains
outside of the law. EX: stealing data, changing bank accounts,
distributing viruses, acts of sabotage and mischief on the internet,
and have cost companies millions of dollars. etc.
Script kiddie
Intentionally
Steals software
erases
media
programs
Illegally
Illegally copies registers and/or
a program activates a
program
Page 571 Discovering Computers 2010: Living in a 33
Digital World Chapter 11
Software Theft
A single-user license agreement typically contains
the following conditions:
Permitted to
• Install the software on one computer
• Make one copy of the software
• Remove the software from your computer before giving it away or selling it
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
Hardware
Hardware theft is vandalism is the act
the act of stealing of defacing or
computer equipment destroying computer
equipment
Parent
Child
•44
Protecting Against Unauthorized Access,
Use, and Computer Sabotage
Firewall: Security system that provides a protective
boundary between a computer or network and the
outside world
Works by closing down all external communications port
addresses
Blocks access to the PC from outside crackers
Blocks access to the Internet from programs on the user’s
PC unless authorized by the user
Important for home PCs that have a direct Internet
connection as well as for businesses
Intrusion protection system (IPS) software is related
Monitors and analyzes traffic allowed by the firewall to try and
detect possible attacks
45
Protect Password
•CLICK TO START
Discovering Computers 2010: Living in a 55
Digital World Chapter 11