1 / 11

Chapter 9

Chapter 9. CH 9 : Computer “Errors”. Human Errors – Humans allowed anywhere near anything important Procedural Errors – Procedures not followed correctly Software Errors – What most people consider “bugs” Hardware Errors – Faulty construction or overload Data Errors – Often caused by humans.

lilika
Download Presentation

Chapter 9

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 9

  2. CH 9 : Computer “Errors” • Human Errors – Humans allowed anywhere near anything important • Procedural Errors – Procedures not followed correctly • Software Errors – What most people consider “bugs” • Hardware Errors – Faulty construction or overload • Data Errors – Often caused by humans

  3. Computer Crimes • Hardware Theft – Actually stealing hardware • Software Theft – Piracy or stealing actual copies of software • Resource Theft – Illegally using services or DDoS attacks • Information Theft – Classified info, industrial espionage, or CC #s • Destruction – Destroying data or physical systems maliciously

  4. Computer Crimes • Q: Who is most likely to lead to a security compromise? • Internal users • External users (clients) • External users (intruders) • A: Internal users, by far, either by accident or on purpose

  5. Identification Methods • What you have • Badges • Keys • What you know • Passwords • Signatures • Who you are • Biometrics – the science of measuring body characteristics

  6. Identification Methods - Problems • What you have • Easy to Steal • What you know • Easy to Break / Guess • Who you are • Harder to fake, but impossible for you to change

  7. Encryption • Encryption is the process of altering data, in order to conceal its true meaning for anyone who does not know how to decrypt it • Plaintext- The unencrypted document • Cyphertext – Plain text that has been encrypted • The only 100 % secure method of encryption is a one-time pad used properly

  8. Encryption • Unfortunately, one-time pads are not practical for most computer encryption purposes • Most encryption uses long keys (long in terms of bits) • 1024-bit + encryption becoming common • Not unbreakable, it just takes prohibitive amounts of time

  9. Mental Health and Computers • Book: Making friends online keeps you from making friends offline, and the online friends you do make are “likely to be trivial, short-lived, and disposable” • Me: I have friends I made online, most of whom I’ve eventually met, even though some of them live in other countries. Doing so has not impeded me from making friends offline, either. • Conclusion: The book is full of it here. (Or it depends on the individual)

  10. Mental Health and Computers • Book: Online gambling will suck out your soul and make you wind up in huge amounts of debt. • Me: … if you are weak minded and already had a problem with gambling. • Conclusion: If you can’t eat this week because you blew all your money betting on online blackjack, get some help.

  11. Mental Health and Computers • Book: Using computers is stressful – 59% of users say the get angry at their PCs & 83% of sys admins report violence towards PCs • Me: The computer is not animate. It cannot hate you or deliberately seek to frustrate you. And if you think you’re mad now, wait until you see how much it costs to replace the thing you just threw out the window. • Conclusion: Count to 10, or go do something productive, but don’t beat up your PC.

More Related