Unauthorized access and use

chrispaul8676 28,871 views 30 slides Jul 30, 2012
Slide 1
Slide 1 of 30
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30

About This Presentation

No description available for this slideshow.


Slide Content

UNAUTHORIZED ACCESS AND USE

UNAUTHORIZED ACCESS - use of a computer or network without permission. - by connecting to it and then logging in as a legitimate user. - do not cause damages. - merely access the data, valuable information or programs in the computer.

UNAUTHORIZED USE - Use of a computer or its data for unapproved or illegal activities. - Ex: gaining access to a bank computer and performing an unauthorized bank transfer etc.

SAFEGUARDS AGAINST UNAUTHORIZED ACCESS AND USE

1. Have a written acceptable use policy (AUP) that outlines the computer activities for which the computer and the network may and may not be used. 2. The use of firewall 3. Access Controls 4. Intrusion detection software

USER NAMES AND PASSWORD

USERNAME/ user ID - A unique combination of characters such as letters of the alphabets or numbers that identifies one specific user.

PASSWORD - A private combination of characters associated with the users name that allow access to certain computer resources. - Some organization use passphrases to authenticates. - A passphrase is a private combination often containing mix capitalization and punctuation.

- Some website uses CAPTHCHA to further protect a users password - CAPTHCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart - It displays a series of distorted characters and requires the user to enter characters correctly to use website…

POSSESSED OBJECTS

- Possessed object is any item that you must carry to gain access to a computer or a computer facility - Examples: badges, cards, smartcards and keys - ATM card is a possessed object - Used in combination with personal identification numbers(PIN)

BIOMETRIC DEVICES

- Authenticates a persons identity by translating a personal characteristic, such as a fingerprints, into a digital code stored in the computer verifying a physical or behavioral characteristic

Hand geometry systems Fingerprint readers

Voice verification system Face recognition system

Signature verification system Iris recognition systems

Retinal scanners

DIGITAL FORENSICS

- Known as computer forensics, network forensics, or cyberforensics - involves the examination of computer media, programs, data and log files on computers, servers, and networks. - Areas that uses it include law enforcement, criminal prosecutors, military intelligence, insurance agencies, and security departments in the private sector.

HEALTH CONCERNS OF COMPUTER USE

COMPUTERS AND HEALTH RISKS

-A repetitive strain injury (RSI) is an injury or disorder of the muscles, nerves, tendons, ligaments and joints. - Tendonitis is inflammation of a tendon due to repeated motion or stress on that tendon.

-Carpal tunnel syndrome (CTS) is inflammation of the nerve that connects the forearm to the palm of the wrist. - Computer vision syndrome (CVS) include sore, tired, burning, itching, or dry eyes; blurred or double vision; distance blurred vision after prolonged staring at a display device; headache or sore neck.

ERGONOMICS AND WORKPLACE DESIGN

ERGONOMICS - An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. - help users to work comfortably and efficiently and helps to protect their health.

COMPUTER ADDICTIONS

SYMPTOMS OF COMPUTER ADDICTION - craves computer time. - overjoyed when at computer. - unable to stop computer activity. - irritable when not at the computer. - neglects family and friends. - problems at work or school.