You are on page 1of 21

CHAPTER 5 01

5.1 Security Issues:


Threats to Computers and
Communication System
• Human Errors 02

• Procedural Errors
• Software Errors
• "Dirty Data " Problems
• Electromechanical Problems
• Natural Hazards
• Computer Crimes
Human Errors
Human Errors

Is a label given to an
action that has negative
consequences or fails to
achieve the desired
outcome
Procedural Errors:

when people fail to follow established


procedures, errors can occur.

04
05 SOFTWARE BUGS

it's an error that prevents the


application from functioning as it
should.

Software Errors:
06

Dirty Data Problems


-ALSO KNOWN AS ROGUE DATA IS INACCURATE,
INCOMPLETE OR INCONSISTENT DATA, ESPECIALLY IN A
COMPUTER SYSTEM OR DATABASE.
Electromechanical Errors

-Mechanical systems can wear out or become


damage
07

-they can also be badly designed or constructed

-power failures and surges can damage equipment


Natural Hazards

Unpredictable and often lead to


disaster when occurs.
09
Computer Crimes

ALSO KNOWN AS
"CYBERCRIME" , THE USE OF TWO TYPES:
A COMPUTER AS AN
INSTRUMENT TO FURTHER *ILLEGAL ACT PERPETRATED
ILLEGAL ENDS AGAINST COMPUTERS OR
TELECOMMUNICATIONS

*USE OF COMPUTERS OR
TELECOMMUNICATIONS TO
ACCOMPLISH AN ILLEGAL ACT
10
Security

is a system of safeguards for protecting


information technology against disasters,
system failures, and unauthorized access
that can result in damage or loss.

5.2
Security Safeguards; Protecting
Computer and Communications
Computer Security can be Divided into
Five Components
• DETERRENTS TO COMPUTER CRIME 2. IDENTIFICATION AND
ACCESS
-enforcing the law
-CERT: The Computer Emergency Response - very legitimate right access by
Team what you have, what you know,
• provide round the clock informatin on and who you are
international computer security threats
• what you have; like keys,
-Tools Used to Fight Fraudulent and cards, signatures, badges
Unauthorized Online Uses • what you know; like pin
• rule base detection software numbers and password
• predictive statistical model software • who you are like; bio metrics
• employee internnet management such as face scan and figer
• internet browisng filtering software print scan
• elctronic surveillance
3. ENCRYPTION 4. PROTECTION OF 5. DISASTER RECOVERY
SOFTWARE AND DATA PLAN
-the process of altering and
changing a data unto -restrict access to online files; • Method of restoring information-
unreadable form to prevent use transaction logs processing operations that have
unauthorized access -use audit controls to track who been halted by destruction or
used what programs and accident
• Advantage: encrypting data servers; which files were opened • Back up everything; put
that is available over the mainframes in different locatio
and so on
Internet keeps thieves and
-use people controls-screen
crackers from reading it.
applicants; do background
• Disadvantage: encrypting
checks; monitor internet, email,
data may prevent law-
and computer usage; use
enforcement officials from
shredders for discarded
reading the data criminals
documents and materials.
are sending to one another.
5.3 Explain Privacy Surveillance: Data
Collections and Spies
Privacy Surveillance

The rise of Big Data has led to continuing threats to


privacy from three giant sources:

• From business organizations


• From governments, local to federal
• From foreign governments and criminal groups
THREE GIANT SOURCES:
14

BUSINESS AND CYBER GOVERNMENT AND CYBER SPYING, HACKING, &


SPYING SPYING CYBERWARFARE BY FOREIGN
GOVERNMENTS & GROUPS
-almost everything we do online is -governments at all levels spy on
being scooped up and recorded their citizens, soemtimes -the world is so interconnected
for use by marketers, and it's encouraged by the law, that it is a constant struggle for
difficult to know what parts of our sometimes in spite of the law, technology managers to keep us
own lives still belong to us. often unknown to us. secure against cyber invasions of all
sorts.
-whatever the impact on your personal privacy, it seems unlikely that -Local police, national ID cards, National Security Agency (NSA), - governments get involved in
you can claim ownership of a lot of data that's being collected about FBI, drones and so on cyberwarfare-warfare involving
you. At work, for instance, you basically have no rights. computers and the internet in which
one nation attacks another's
information system.
Data Collectors
-data modelers and data governance experts need to work with the
company's security experts to create policies and procedures designed
to handle confidential data within the organizations and to decide
which data can be safely exposed to vendors and others outside the
firm.
16

spying combines monitoring and


SPIES surveillance with active intelligence
gathering and data analysis to
discover what is occurring relative
to government or corporate
interests.
SIMPLE STEPS THAT
CAN HELP YOU
SAFEGUARD YOUR
PRIVACY
SECURE YOUR CURRENT VPN (VIRTUAL PRIVATE ENABLE TWO-FACTOR
BROWSER NETWORK) AUNTHENTICATION

clear out your cookie caches - a virtual private network is a • using 2FA creates an additional
and browser histories, and way to create a secure tunnel step to access your accounts and
when you visit a website, make through the inherently insecure data.
sure HTTPS is enabled. internet. • the most common methods are
via an SMS message, a biometric
Search Engines: marker such as a figerprint or iris
Passwords and Vaults
there are engines like scan or a PIN
-using complex passwords is the
DuckDuckGo and Qwant that first line of defense you have to SECURE YOUR MOBILE DEVICES
don't record your search history secure your online accounts. • PATCH
and block ad trackers.
these patches resolve new bugs
-password vaults generate and flaws, as well as sometimes
Use some of these browser
strong passwords on your provide performance fixes.
pugins: • LOCK IT DOWN
behalf, as well as proactively
HTTPS Everywhere, Facebook make sure your mobile device is
change old and weak ones.
Container, Disconnect, Blur, or locked in some way to prevent its
Privacy Badger. physical compromise.
ENCRYPT YOUR MESSAGES MOBILE APPLICATIONS REDUCE YOUR ONLINE
SOURCES AND FOOTPRINT
• SIGNAL
PERMISSIONS
the most accessible, secure messaging
service in existence today. -downloading apps from trusted • HavelBeenPwned
• WhatsApp sources such as Google Play and - use the HavelBeenPwned
it completed a rollout of end-to-end Apple's App store is always the service to check if you have been
encryption across all compatible devices in best option. compromised in a large data breach.
2016. -remember that apps can request a variety of permissions that can

• Apple's iMessage create security risks or information leaks. • Google Account


only convesations taking place between - -if you use Google services,
iPhones are encrypted. SECURE EMAIL examine the Privacy checkup
• Facebook Messenger • PROTON MAIL function and review settings in the
with other end-to-end options available, an open-source email system main Google Account.
it's not worth the risk. based in Switzerland and
• Telegram protected under the country's
it's not encrypted by default but does have strict data protection laws.
a "Secret Chat" option that is end-to-end
encrypted.

19
The Internet of Things

-keep loT devices password protected, make sure


they run up-to-date software, and check the
20
default settings.

-consider running all your loT devices on a


separate home network.
21

THANK YOU!!!
I'll catch you online!

You might also like