Computer Security.ppt
《Computer Security.ppt》由会员分享,可在线阅读,更多相关《Computer Security.ppt(39页珍藏版)》请在得力文库 - 分享文档赚钱的网站上搜索。
1、ComputerSecurity master useful terms understand what are threats to computer security and how to protect computer securityRequirements:Text I.Threats to Computer Security Threats to computer security are computer crimes(including viruses and electronic break-ins)and natural and other hazards.1.Compu
2、ter Criminals A computer crime is an illegal action in which the perpetrator uses special knowledge of computer technology.Computer criminals are of four types:一、计算机安全面临的威胁一、计算机安全面临的威胁 计算机安全面临的威胁是计算机犯罪(包括病毒和电子闯入)以及自然与其他危害。计算机安全面临的威胁是计算机犯罪(包括病毒和电子闯入)以及自然与其他危害。1 1、计算机罪犯、计算机罪犯 计算机犯罪是犯罪者使用专门计算机技术知识所做出的非
3、法行为。计算机罪犯有计算机犯罪是犯罪者使用专门计算机技术知识所做出的非法行为。计算机罪犯有4 4种类型:种类型:(1)Employees The largest category of computer criminals consists of those with the easiest access to computersnamely,employees.Sometimes the employee is simply trying to steal something from the employerequipment,software,electronic funds,propr
4、ietary information,or computer time.Sometimes the employee may be acting out of resentment and is trying to“get back”at the company.(1 1)雇员)雇员 人人数数最最多多的的计计算算机机罪罪犯犯类类型型由由那那些些最最容容易易接接近近计计算算机机的的人人,亦亦即即雇雇员员,构构成成。有有时时,雇雇员员只只是是设设法法从从雇雇主主那那盗盗窃窃某某种种东东西西设设备备、软软件件、电电子子资资金金、专专有有信信息息或或计计算算机机时时间间。有时,雇员可能出于怨恨而行动,
5、试图有时,雇员可能出于怨恨而行动,试图“报复报复”公司。公司。(2)Outside Users Not only employees but also some suppliers or clients may have access to a companys computer system.Examples are bank customers who use an automatic teller machine.Like employees,these authorized users may obtain confidential passwords or find other wa
6、ys of committing computer crimes.(2 2)外部用户)外部用户 不不仅仅雇雇员员,而而且且有有些些供供应应商商或或客客户户也也可可能能有有机机会会访访问问公公司司的的计计算算机机系系统统。使使用用自自动动柜柜员员机机的的银银行行客客户户就就是是一一例例。像像雇雇员员一一样样,这这些些授授权权的的用用户户可可能能获获取取秘秘密密口口令令,或或者者找找到到进进行计算机犯罪的其他途径。行计算机犯罪的其他途径。(3)“Hackers”and“Crackers”Some people think of these two groups as being the same,
7、but they are not.Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it.Crackers do the same thing but for malicious purposes.They may intend to steal technical information or to introduce what they call a“bomb”a destructive computer programinto the syst
8、em.(3 3)“黑客黑客”与与“非法侵入者非法侵入者”有有些些人人以以为为这这两两类类人人相相同同,其其实实不不然然。黑黑客客获获取取对对计计算算机机系系统统未未经经授授权权的的访访问问,是是因因为为这这种种行行为为有有趣趣和和具具有有挑挑战战性性。非非法法侵侵入入者者行行为为相相同同,但但出出于于恶恶意意。他他们们可可能能企企图图窃窃取取技技术信息,或者往系统里放置他们所谓的术信息,或者往系统里放置他们所谓的“炸弹炸弹”一种破坏性计算机程序。一种破坏性计算机程序。(4)Organized Crime Organized crime has discovered that computers
9、 can be used just like legitimate business people use them,but for illegal purposes.For example,computers are useful for keeping track of stolen goods or illegal gambling debts.In addition,counterfeiters and forgers use microcomputers and printers to produce sophisticated-looking documents such as c
10、hecks and drivers licenses.(4 4)犯罪团伙)犯罪团伙 犯犯罪罪团团伙伙发发现现,可可以以像像合合法法的的商商业业人人员员一一样样使使用用计计算算机机,但但为为了了非非法法的的目目的的。例例如如,计计算算机机可可用用于于跟跟踪踪赃赃物物或或非非法法赌赌债债。另另外外,伪伪造造者者使使用用微微机机和和打打印印机机伪伪造造支支票票、驾驾驶驶证证等等看起来很复杂的证件。看起来很复杂的证件。2.Computer Crime Computer crime can take various forms,including:(1)Damage Disgruntled employ
11、ees sometimes attempt to destroy computers,programs,or files.In recent years,computer viruses have gained wide notoriety.Viruses are programs that“migrate”through networks and operating systems and attach themselves to different programs and databases.2 2、计算机犯罪、计算机犯罪计算机犯罪可能采取各种形式,包括:计算机犯罪可能采取各种形式,包括
12、:(1 1)破坏)破坏 不不满满的的雇雇员员有有时时企企图图破破坏坏计计算算机机、程程序序或或文文件件。近近年年来来,计计算算机机病病毒毒已已是是臭臭名名远远扬扬。病毒是一种程序,在网络和操作程序中病毒是一种程序,在网络和操作程序中“迁移迁移”,并附加到不同的程序和数据库上。,并附加到不同的程序和数据库上。A variant on the virus is the worm.This destructive program fills a computer system with self-replicating information,clogging the system so that
13、its operations are slowed or stopped.The most infamous is known as the Internet Worm.In 1988,it traveled across North America,stopping thousands of computers along its way.病病毒毒的的一一个个变变种种是是蠕蠕虫虫病病毒毒。这这种种破破坏坏性性程程序序用用自自我我复复制制的的信信息息填填满满计计算算机机系系统统,以以阻阻塞塞系系统统,使使系系统统的的运运行行减减慢慢或或停停止止。其其中中最最臭臭名名昭昭著著的的是是因因特特网网
14、蠕蠕虫虫。19881988年年,它它行行遍遍北北美美,途途中中使使成成千千上上万万的的计计算算机机瘫瘫痪。痪。Viruses typically find their way into microcomputers through copied floppy disks or programs downloaded from electronic bulletin boards.Because viruses can be so seriouscertain“disk-killer”viruses can destroy all the information on ones systemco
15、mputer users are advised to exercise care in accepting new programs and data from other sources.病病毒毒一一般般是是通通过过复复制制的的软软盘盘或或从从电电子子公公告告版版上上下下载载的的程程序序进进入入微微机机。因因为为病病毒毒可可造造成成严严重重危危害害某某些些“磁磁盘盘杀杀手手”病病毒毒能能毁毁坏坏系系统统上上的的所所有有信息,建议计算机用户在接受来自其他途径的新程序和数据时一定要小心。信息,建议计算机用户在接受来自其他途径的新程序和数据时一定要小心。Detection programs ca
16、lled virus checkers are available to alert users when certain kinds of viruses enter the system.Unfortunately,new viruses are being developed all the time,and not all viruses can be detected.There are recommended procedures to reduce the risk of catching a computer virus and to minimize its potentia
17、l damage.现在有被称为病毒检查程序的检测程序可供使用,在某些种类的病现在有被称为病毒检查程序的检测程序可供使用,在某些种类的病毒进入系统时,向用户发出警告。不幸的是,新的病毒不断被开发出来,毒进入系统时,向用户发出警告。不幸的是,新的病毒不断被开发出来,而且并不是所有的病毒都能被检测出来。现在有降低计算机病毒感染风而且并不是所有的病毒都能被检测出来。现在有降低计算机病毒感染风险并尽量减少其潜在破坏的推荐步骤。险并尽量减少其潜在破坏的推荐步骤。(2)Theft Theft can take many formsof hardware,of software,of data,of comp
18、uter time.Thieves steal equipment,of course,but there are also“white-collar crimes.”Thieves steal data in the form of confidential information such as preferred client lists.They also use(steal)their companys computer time to run another business.(2 2)盗窃)盗窃 盗窃可能采取多种形式盗窃可能采取多种形式盗窃硬件、盗窃软件、盗窃数据、盗窃盗窃硬件、
19、盗窃软件、盗窃数据、盗窃计算机时间等。窃贼当然盗取设备,但也有计算机时间等。窃贼当然盗取设备,但也有“白领犯罪行为白领犯罪行为”。窃贼盗。窃贼盗取被看作机密信息的数据,如优先客户名单。他们也使用(盗窃)公司取被看作机密信息的数据,如优先客户名单。他们也使用(盗窃)公司的计算机时间处理其他事务。的计算机时间处理其他事务。Unauthorized copyinga form of theftof programs for personal gain is called software piracy.Pirated software accounts for 40 percent of softw
20、are used in the United States.The incidence of pirated software is even higher overseas in such countries as Italy(82 percent)and Thailand(92 percent).为个人利益而对程序进行的未经授权的拷贝也是一种盗窃形式,被为个人利益而对程序进行的未经授权的拷贝也是一种盗窃形式,被称为软件盗版。盗版软件占到美国所使用的软件的称为软件盗版。盗版软件占到美国所使用的软件的40%40%。盗版软件在海。盗版软件在海外的比例甚至更高,如在意大利(外的比例甚至更高,如在意
21、大利(82%82%)和泰国()和泰国(92%92%)等国家。)等国家。(3)Manipulation Finding entry into someones computer network and leaving a pranksters message may seem like fun,which is why hackers do it.It is still against the law.Moreover,even if the manipulation seems harmless,it may cause a great deal of anxiety and wasted t
22、ime among network users.(3 3)操作)操作 进入某人的计算机网络并留下恶作剧式的信息,可能显得很好玩。这也进入某人的计算机网络并留下恶作剧式的信息,可能显得很好玩。这也是为什么黑客这样做的原因。这样做仍然是违法的。此外,即使这样的操作是为什么黑客这样做的原因。这样做仍然是违法的。此外,即使这样的操作似乎没有危害,它也可能给网络用户造成很大的焦虑和时间浪费。似乎没有危害,它也可能给网络用户造成很大的焦虑和时间浪费。3.Other Hazards There are plenty of other hazards to computer systems and data
23、besides criminals.They include the following:(1)Natural Hazards Natural forces include fires,floods,wind,hurricanes,tornadoes,and earthquakes.Even home computer users should store backup disks of programs and data in safe locations in case of fire or storm damage.3 3、其他危害、其他危害 除了罪犯之外,计算机系统和数据还面临大量其他
24、的危害。这包括如下危害:除了罪犯之外,计算机系统和数据还面临大量其他的危害。这包括如下危害:(1 1)自然危害)自然危害 大自然的力量包括火灾、水灾、风、飓风、龙卷风和地震。即使家用计算机大自然的力量包括火灾、水灾、风、飓风、龙卷风和地震。即使家用计算机用户也应在安全地点保存程序与数据的备份磁盘,以防火灾或暴风的毁坏。用户也应在安全地点保存程序与数据的备份磁盘,以防火灾或暴风的毁坏。(2)Civil Strife and Terrorism Wars,riots,and other forms of political unrest are real risks in some parts o
25、f the world.Even people in developed countries,however,must be mindful that acts of sabotage are possible.(2 2)内乱与恐怖主义)内乱与恐怖主义 战争、暴乱和其他形式的政治动荡在世界的某些地区是实实在在的战争、暴乱和其他形式的政治动荡在世界的某些地区是实实在在的威胁。然而,即使是发达国家的人们,也必须保持警惕,在他们国家也威胁。然而,即使是发达国家的人们,也必须保持警惕,在他们国家也可能发生破坏行为。可能发生破坏行为。(3)T e c h n o l o g i c a l F a i
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- Computer Security
限制150内