UNIT 12 COMPUTER SECURITY.ppt
上传人:sy****28 上传时间:2024-09-10 格式:PPT 页数:32 大小:168KB 金币:16 举报 版权申诉
预览加载中,请您耐心等待几秒...

UNIT 12 COMPUTER SECURITY.ppt

UNIT12COMPUTERSECURITY.ppt

预览

免费试读已结束,剩余 22 页请下载文档后查看

16 金币

下载此文档

如果您无法下载资料,请参考说明:

1、部分资料下载需要金币,请确保您的账户上有足够的金币

2、已购买过的文档,再次下载不重复扣费

3、资料包下载后请先用软件解压,在使用对应软件打开

Unit12ComputerSecurityThreatstoComputerSecurity(1)Employees(2)OutsideUsers(3)“Hackers”and“Crackers”(4)OrganizedCrime2.ComputerCrimeAvariantonthevirusistheworm.Thisdestructiveprogramfillsacomputersystemwithself-replicatinginformation,cloggingthesystemsothatitsoperationsareslowedorstopped.ThemostinfamousisknownasintheInternetWorm.In1998,ittraveledacrossNorthAmerica,stoppingthousandsofcomputersalongitsway.Virusestypicallyfindtheirwayintomicrocomputersthroughcopiedfloppydisksorprogramsdownloadedfromelectronicbulletinboards.Becausevirusescanbesoserious—certain“disk-killer”virusescandestroyalltheinformationonone’ssystem—computerusersareadvisedtoexercisecareinacceptingnewprogramsanddatafromothersources.Detectionprogramscalledviruscheckersareavailabletoalertuserswhencertainkindsofvirusesenterthesystem.Unfortunately,newvirusesarebeingdevelopedallthetime,andnotallvirusescanbedetected.Therearerecommendedprocedurestoreducetheriskofcatchingacomputervirusandtominimizeitspotentialdamage.(2)TheftUnauthorized–aformoftheft—ofprogramsforpersonalgainiscalledsoftwarepiracy.Piratedsoftwareaccountsfor40percentofsoftwareusedintheUnitedStates.TheincidenceofpiratedsoftwareisevenhigheroverseasinsuchcountriesasItaly(82percent)andThailand(92percent).(3)Manipulation3.OtherHazards(2)CivilStrifeandTerrorism(3)TechnologicalFailuresMostmicrocomputerusersbuyasurgeprotector,adevicethatseparatesthecomputerfromthepowersourceofthewalloutlet.Whenavoltagesurgeoccurs,itactivatesacircuitbreakerinthesurgeprotector,protectingthecomputersystem.Anothertechnologicalcatastropheiswhenahard-diskdrivesuddenly“crashes,”orfails,perhapsbecauseithasbeenbumpedinadvertently.Iftheuserhasforgottentomakebackupcopiesofdataontheharddisk,datamaybelost.(4)HumanErrorsMeasurestoProtectComputerSecurity1.EncryptingMessagesBusinesseshavebeenencrypting,orcoding,messagesforyears.Theyhavebecomesogoodatitthatsomelawenforcementagenciesareunableto“wiretap”messagesfromsuspectedcriminals.Somefederalagencieshavesuggestedthatastandardencryption