CH 1: Lesson 5 - Computer Security
Stolen data
private information can be stolen from your home computer or business office. hackers that gain control of your computer, network, or applications can access data they find stored in those locations.
Intercepted data
private information that is sent between locations can be intercept by someone that is monitoring the communications. for example if you enter a username and a password in a website those things must go from your computer across the internet to the web server.
security risk
result in private information being lost or used incorrectly.
Backup Plan
that saves all of your important emails, files, and other documents somewhere outside your computer.
Private information
your social security number, your bank records, your health records, and your social media usernames and passwords are likely available on your computer or through website that holds your accounts.
Health Insurance Portability and Accountability Act (HIPPA)
A law that protects patients in hospitals and doctors offices.
Personal Strategies (6 strategies)
Avoid giving out personal information. Never share your private login to a service with someone else. Use a strong password that is hard for others to guess. Avoid clicking on unknown links. Criminals can set up fake websites that look exactly like the login page to your sensitive areas.
Children's Online Privacy Protection Act (COPPA)
Created to protect children on the Internet. The COPPA law gives parents control over the type of information that website operators can collect from children under 13 years old.
Computer fraud and Abuse Act (CFAA)
Enacted in 1986 to address rising problems with computer hacking. This federal law prohibits unauthorized access to computers and networks in the United States.
Electronic Communication Privacy Act (ECPA)
Enacted to include electronic data in the list of things that the government is forbidden to intercept through wire taps or other eavesdropping.
System Scan
Every file on your computer is checked by the anti-virus software.
U.S Copyright Act
Gives computer programs the same copyright status as literary works. This means that software is protected from illegal copying.
Confidentiality
In order to better provide data security, companies have come up with a business model.
Integrity
Involves maintaining the consistency, accuracy, and trustworthiness of your data.
confidential information
New product plans, marketing strategies, customer list, competitive analysis, and other important business information should be kept securely within the company and not leaked outside.
Malware
Programs might change the behavior of your computer to show you unwanted advertising track your online activity, or steal your personal information.
Virus
Programs that are designed to damage your computer or allow a remote user to control your system.
Quarantine
The file is not deleted, but has been moved to a sort of "file jail" where it cannot do any harm.
Gramm-Leach-Biley Act (GLBA)
This act details the protections that must be in place when dealing with your private financial information.
Availability
You can get to the information you need at all times.
Identity theft
a criminal that gains access or control of your computer can steal all of this personal information. with the right data, username, and passwords, a criminal can pretend to be you.
Infected applications
applications running on your computer might become infected with viruses or other malware. the applications can then become unstable, quit working, completely, corrupt your data, or send private data out to others.
sensitive data
belong to customers such as credit cards numbers businesses need a way to keep this information safe and secure. nobody outside the company should be able to view sensitive records, and only authorized employees within the company should be able to access those records.