2. UNAUTHORIZED ACCESS
- use of a computer or network without
permission.
- by connecting to it and then logging in
as a legitimate user.
- do not cause damages.
- merely access the data, valuable
information or programs in the
computer.
3. UNAUTHORIZED USE
- Use of a computer or its data for
unapproved or illegal activities.
- Ex: gaining access to a bank
computer and performing an
unauthorized bank transfer etc.
5. 1. Have a written acceptable use
policy (AUP) that outlines the
computer activities for which the
computer and the network may and
may not be used.
2. The use of firewall
3. Access Controls
4. Intrusion detection software
7. USERNAME/ user ID
- A unique combination of
characters such as letters of the
alphabets or numbers that identifies
one specific user.
8. PASSWORD
- A private combination of characters
associated with the users name that
allow access to certain computer
resources.
- Some organization use passphrases
to authenticates.
- A passphrase is a private combination
often containing mix capitalization and
punctuation.
9.
10. - Some website uses CAPTHCHA
to further protect a users password
- CAPTHCHA stands for Completely
Automated Public Turing test to tell
Computers and Humans Apart
- It displays a series of distorted
characters and requires the user to
enter characters correctly to use
website…
13. - Possessed object is any item
that you must carry to gain
access to a computer or a
computer facility
- Examples:
badges, cards, smartcards and
keys
- ATM card is a possessed object
- Used in combination with
personal identification
15. - Authenticates a persons
identity by translating a
personal characteristic, such
as a fingerprints, into a digital
code stored in the computer
verifying a physical or
behavioral characteristic
21. forensics, network forensics, or
cyberforensics
- involves the examination of computer
media, programs, data and log files on
computers, servers, and networks.
- Areas that uses it include law
enforcement, criminal
prosecutors, military
intelligence, insurance agencies, and
security departments in the private
sector.
24. -A repetitive strain injury (RSI) is an
injury or disorder of the
muscles, nerves, tendons, ligament
s and joints.
- Tendonitis is inflammation of a
tendon due to repeated motion or
stress on that tendon.
25. -Carpal tunnel syndrome (CTS) is
inflammation of the nerve that
connects the forearm to the palm of
the wrist.
- Computer vision syndrome (CVS)
include sore, tired, burning, itching,
or dry eyes; blurred or double
vision; distance blurred vision after
prolonged staring at a display
27. ERGONOMICS
- An applied science devoted to
incorporating comfort, efficiency,
and safety into the design of items
in the workplace.
- help users to work comfortably
and efficiently and helps to protect
their health.
29. SYMPTOMS OF COMPUTER
ADDICTION
- craves computer time.
- overjoyed when at computer.
- unable to stop computer activity.
- irritable when not at the computer.
- neglects family and friends.
- problems at work or school.