Professional Documents
Culture Documents
Fundamentals,
2011 Edition
Living in a Digital World
Objectives Overview
Discuss ways to
Discuss issues
prevent health-related
surrounding
disorders and injuries
information privacy
due to computer use
Unethical
Cyberextortionists Cyberterrorists
Employees
CLICK TO START
Discovering Computers Fundamentals, 2011 Edition 7
Chapter 10
Internet and Network Attacks
Unknown
Music or unusual Programs or files
Existing programs programs or files
sound plays do not work
and files disappear mysteriously
randomly properly
appear
Operating system
System properties Operating system
shuts down
change does not start up
unexpectedly
Information
Insurance
security
agencies
departments
Page 392 Discovering Computers Fundamentals, 2011 Edition 18
Chapter 10
Hardware Theft and Vandalism
Hardware vandalism
Hardware theft is the
is the act of defacing
act of stealing
or destroying
computer equipment
computer equipment
Cables to lock
Click to view Web Link,
Real time
equipment location system
click Chapter 10, Click Web
Link from left navigation,
then click RTLS
below Chapter 10
Illegally registers
Illegally copies a
and/or activates
program
a program
Not permitted to
• Install the software on a network
• Give copies to friends or colleagues while continuing to use the software
• Export the software
• Rent or lease the software
Page 394 Discovering Computers Fundamentals, 2011 Edition 22
Chapter 10
Software Theft
• Copying, loaning,
borrowing, renting, or
distributing software
can be a violation of
copyright law
• Some software requires
product activation to
function fully
Parent
Child
Configure a WAP
A wireless access
Change the default so that only certain Use WPA or WPA2
point should not
SSID devices can access security standards
broadcast an SSID
it
• Ergonomics is an
applied science devoted
to incorporating
comfort, efficiency, and
safety into the design of
items in the workplace
Intellectual property rights are the rights to which creators are entitled for their work
• Green computing
involves reducing the
electricity and
environmental waste
while using a computer
– ENERGY STAR program
• Spam is an unsolicited
e-mail message or
newsgroup posting
• E-mail filtering blocks e-
mail messages from
designated sources
• Anti-spam programs
attempt to remove
spam before it reaches
your inbox
Pages 404 - 405 Discovering Computers Fundamentals, 2011 Edition 44
Figure 10-23 Chapter 10
Ethics and Society
• Phishing is a scam in
which a perpetrator sends
an official looking e-mail
message that attempts to
obtain your personal and
financial information
• Pharming is a scam where
a perpetrator attempts to
obtain your personal and
financial information via
spoofing
Page 405 Discovering Computers Fundamentals, 2011 Edition 45
Figure 10-24 Chapter 10
Ethics and Society
Chapter 10 Complete