Professional Documents
Culture Documents
CT006-1
Security Issues
Learning Outcomes
At the end of this section, YOU should be able to:
To explain and describe the security risks arises in the use of IT at work
Chapter 5
System Failure
Backups
Chapter 5
Chapter 5
Worm copies
itself repeatedly,
using up
resources
and possibly
shutting down
computer or
network
Can spread
and
damage
files
Chapter 5
Payload
(destructive
event) that is
delivered when
you open file, run
infected program,
or boot computer
with infected disk
in disk drive
At medium security
level, warning displays
that document
contains macro
Macros are
instructions saved in
an application, such
as word processing
or spreadsheet
program
Chapter 5
Chapter 5
Antivirus programs
look for virus
signatures
Chapter 5
Chapter 5
10
Chapter 5
11
If the antivirus
program flags an
e-mail attachment
as infected, delete
the attachment
immediately
Install an antivirus
program on all of
your computers
Check all
downloaded
programs for
viruses, worms,
or Trojan horses
Chapter 5
Never open an
e-mail attachment
unless you are
expecting it and
it is from a
trusted source
Install a personal
firewall program
12
System Failure
What is a system failure?
Prolonged malfunction
of computer
Overvoltage or
power surge
significant increase
in electrical power
Undervoltagedrop
in electrical supply
Chapter 5
13
System Failure
What is a surge protector?
Chapter 5
14
Computer Emergency
Response Team Coordination
Center (CERT/CC) assists
with DDoS attacks
p. 587
Computing and IT in the Workplace
Chapter 5
15
Secure site
is Web site that uses
encryption to secure data
Digital certificate is notice that
guarantees Web site is legitimate
Chapter 5
16
Authorized person
or company that
issues and verifies
digital certificates
Users apply for
digital certificate
from CA
Chapter 5
17
Web addresses
beginning with
https indicate
secure
connections
Chapter 5
18
Pretty Good
Privacy (PGP)
is popular
e-mail encryption
program
Digital signature
is encrypted
code attached to
e-mail message
to verify identity
of sender
Freeware for
personal, noncommercial use
Chapter 5
19
Full
Fullbackup
backup
all
allfiles
filesinin
computer
computer
Selective
Selectivebackup
backup
select
selectwhich
whichfiles
files
totoback
backup
up
Three-generation
Three-generation
backup
backup
preserves
preserves
three
threecopies
copiesofof
important
importantfiles
files
Chapter 5
20
Chapter 5
21
Chapter 5
22
Backup plan
how backup files
and equipment
would be used to
resume information
processing
Recovery plan
actions to be taken
to restore full
information
processing operations
Chapter 5
Test plan
simulates various
levels of disasters
and records ability
to recover
23
Chapter 5
24
Review Questions
Chapter 5
25
Q&A
Computing and IT in the Workplace
Chapter 5
26
Chapter 5
27