Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
SlideShare a Scribd company logo
UNAUTHORIZED
ACCESS AND USE
UNAUTHORIZED ACCESS

 - use of a computer or network without
                permission.
- by connecting to it and then logging in
            as a legitimate user.
         - do not cause damages.
    - merely access the data, valuable
      information or programs in the
                 computer.
UNAUTHORIZED USE

- Use of a computer or its data for
  unapproved or illegal activities.
  - Ex: gaining access to a bank
   computer and performing an
  unauthorized bank transfer etc.
SAFEGUARDS
   AGAINST
UNAUTHORIZED
ACCESS AND USE
1. Have a written acceptable use
   policy (AUP) that outlines the
 computer activities for which the
computer and the network may and
          may not be used.
        2. The use of firewall
         3. Access Controls
  4. Intrusion detection software
USER NAMES AND
   PASSWORD
USERNAME/ user ID

     - A unique combination of
  characters such as letters of the
alphabets or numbers that identifies
          one specific user.
PASSWORD

  - A private combination of characters
  associated with the users name that
    allow access to certain computer
                resources.
 - Some organization use passphrases
             to authenticates.
- A passphrase is a private combination
 often containing mix capitalization and
               punctuation.
Unauthorized access and use
- Some website uses CAPTHCHA
 to further protect a users password
- CAPTHCHA stands for Completely
 Automated Public Turing test to tell
     Computers and Humans Apart
    - It displays a series of distorted
 characters and requires the user to
   enter characters correctly to use
                 website…
Unauthorized access and use
POSSESSED
 OBJECTS
- Possessed object is any item
    that you must carry to gain
     access to a computer or a
         computer facility
            - Examples:
 badges, cards, smartcards and
                keys
- ATM card is a possessed object
    - Used in combination with
       personal identification
BIOMETRIC
 DEVICES
- Authenticates a persons
    identity by translating a
personal characteristic, such
as a fingerprints, into a digital
 code stored in the computer
     verifying a physical or
   behavioral characteristic
Fingerprint readers




Hand geometry
   systems
Face recognition system




Voice verification
     system
Signature
verification system




              Iris recognition systems
Retinal scanners
DIGITAL FORENSICS
forensics, network forensics, or
              cyberforensics
- involves the examination of computer
media, programs, data and log files on
   computers, servers, and networks.
     - Areas that uses it include law
          enforcement, criminal
           prosecutors, military
 intelligence, insurance agencies, and
   security departments in the private
                  sector.
HEALTH
CONCERNS OF
COMPUTER USE
COMPUTERS AND
 HEALTH RISKS
-A repetitive strain injury (RSI) is an
      injury or disorder of the
muscles, nerves, tendons, ligament
             s and joints.

  - Tendonitis is inflammation of a
 tendon due to repeated motion or
       stress on that tendon.
-Carpal tunnel syndrome (CTS) is
   inflammation of the nerve that
connects the forearm to the palm of
             the wrist.

- Computer vision syndrome (CVS)
include sore, tired, burning, itching,
   or dry eyes; blurred or double
vision; distance blurred vision after
   prolonged staring at a display
ERGONOMICS AND
WORKPLACE DESIGN
ERGONOMICS

  - An applied science devoted to
 incorporating comfort, efficiency,
and safety into the design of items
         in the workplace.
 - help users to work comfortably
and efficiently and helps to protect
            their health.
COMPUTER
ADDICTIONS
SYMPTOMS OF COMPUTER
           ADDICTION

        - craves computer time.
    - overjoyed when at computer.
 - unable to stop computer activity.
- irritable when not at the computer.
     - neglects family and friends.
     - problems at work or school.
Unauthorized access and use

More Related Content

Unauthorized access and use

  • 2. UNAUTHORIZED ACCESS - use of a computer or network without permission. - by connecting to it and then logging in as a legitimate user. - do not cause damages. - merely access the data, valuable information or programs in the computer.
  • 3. UNAUTHORIZED USE - Use of a computer or its data for unapproved or illegal activities. - Ex: gaining access to a bank computer and performing an unauthorized bank transfer etc.
  • 4. SAFEGUARDS AGAINST UNAUTHORIZED ACCESS AND USE
  • 5. 1. Have a written acceptable use policy (AUP) that outlines the computer activities for which the computer and the network may and may not be used. 2. The use of firewall 3. Access Controls 4. Intrusion detection software
  • 6. USER NAMES AND PASSWORD
  • 7. USERNAME/ user ID - A unique combination of characters such as letters of the alphabets or numbers that identifies one specific user.
  • 8. PASSWORD - A private combination of characters associated with the users name that allow access to certain computer resources. - Some organization use passphrases to authenticates. - A passphrase is a private combination often containing mix capitalization and punctuation.
  • 10. - Some website uses CAPTHCHA to further protect a users password - CAPTHCHA stands for Completely Automated Public Turing test to tell Computers and Humans Apart - It displays a series of distorted characters and requires the user to enter characters correctly to use website…
  • 13. - Possessed object is any item that you must carry to gain access to a computer or a computer facility - Examples: badges, cards, smartcards and keys - ATM card is a possessed object - Used in combination with personal identification
  • 15. - Authenticates a persons identity by translating a personal characteristic, such as a fingerprints, into a digital code stored in the computer verifying a physical or behavioral characteristic
  • 17. Face recognition system Voice verification system
  • 18. Signature verification system Iris recognition systems
  • 21. forensics, network forensics, or cyberforensics - involves the examination of computer media, programs, data and log files on computers, servers, and networks. - Areas that uses it include law enforcement, criminal prosecutors, military intelligence, insurance agencies, and security departments in the private sector.
  • 24. -A repetitive strain injury (RSI) is an injury or disorder of the muscles, nerves, tendons, ligament s and joints. - Tendonitis is inflammation of a tendon due to repeated motion or stress on that tendon.
  • 25. -Carpal tunnel syndrome (CTS) is inflammation of the nerve that connects the forearm to the palm of the wrist. - Computer vision syndrome (CVS) include sore, tired, burning, itching, or dry eyes; blurred or double vision; distance blurred vision after prolonged staring at a display
  • 27. ERGONOMICS - An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace. - help users to work comfortably and efficiently and helps to protect their health.
  • 29. SYMPTOMS OF COMPUTER ADDICTION - craves computer time. - overjoyed when at computer. - unable to stop computer activity. - irritable when not at the computer. - neglects family and friends. - problems at work or school.