CS3 - Kurtz  Santa Monica College 



Embezzlement  An "inside job" whereby a trusted employee steals from his or her employer
Salami scheme An embezzlement scheme where an employee deducts fractions of a penny following a round- down and transfers the excess to a special account for later collection
Access Controls Security measures that control computer access
Identification Verifies valid users
Authentication Verifies identity
Passwords  Codes known only to authorized users
Used to authenticate authorized users
Longer passwords have more possible combinations and take longer to guess
Encryption Data is encoded using a special program and can only be decoded by using a matching program
Makes use of one or more encryption keys to decode data
Access Levels Data and programs at different levels of sensitivity are protected from use by employees at varying levels
Access records Logs showing who accessed or tried to access what data and programs
Biometric ID  Identification via physical attributes such as fingerprints, hand geometry, face recognition, iris recognition, retinal scans, voice verification, and handwritten signatures.
Possessed object Any item you must carry to gain access to a computer or facility (e.g., ATM card)
Virtual Private Network VPN
Permits remote users to connect to an organizations internal network securely
Cookies Small text files placed on a user's computer by a web server
Hacker An outside agent who "breaks into" a computer system 
Techniques involve "cracking" passwords, piggyback and trojan horses
Viruses and Worms A program that duplicates itself, travels between computers, and often destroys data 
Virus transmission is often via E-mail attachments
Spread by opening infected files (macro viruses), running infected files (file viruses), and booting computers with an infected floppy disk in the the disk drive (boot sector viruses).
Trojan Horse Looks like a legitimate program
Usually triggered by a certain condition or action
Usually written and distributed with malicious intent
Phishing A scam that uses an official looking Email message that attempts to obtain a user's personal or financial information
PC Hygiene  Virus prevention 
Do not turn on a computer with a floppy disk in the drive 
Do not run executables received via E-mail , a network, from a BBS, or from a floppy disk without checking for a virus first 
Use anti-viral software the most powerful tool for virus prevention
Software Piracy  Making unauthorized copies of programs 
Most programs today are not copy protected 
Software firms offer manuals, warranties, and updates to licensed users, conduct copyright education campaigns, and pursue pirates
Single User License Agreements
End User License Agreements
Most permit installation on only one computer
Most permit making one copy for backup purposes
Most allow users to give or sell the license only after removing it from their computer
Most prohibit renting or leasing the license
Software & Industry Information Association SIIA
Formerly Software Publishers Association (SPA)
Software Police 
Consortium of Software Publishers 
Actively attempt to find a prevent copyright violations
Privacy rights What personal information about yourself is available to others and how it may be used 
Federal law has established rules for use of federal databases and the collection and use of personal credit information
E-mail Privacy of E-mail is not guaranteed 
E-mail on a company computer is the property of the company, regardless of content, and may be read by company officials 
Government E-mail may be public domain 
E-mail may be encrypted to protect privacy if company policy does not prohibit
Intellectual Property Rights  The rights of musicians, artists, authors, and inventors to control the works they create. 
Under most circumstances, you must have a signed release to use a copyright photo or article in another publication
Automation Human workers are replaced by machines 
Causing a general shift in the labor mix 
Helps separate the simple from the complex, the unsafe form the safe 
Robots are freeing workers from unsafe or boring (simple) jobs
Computer use in the workplace Decision making is moving to lower levels 
Telecommuting is an option 
Increase independence among workers
Ergonomics An applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Carpal tunnel syndrome  CTS 
Repetitive strain injury 
Swollen wrist tendons cause pain & numbness
Video Display Terminals  VDTs 
Concern over glare, eyestrain, possible radiation effects
Virtual Reality 3 dimensional simulations 
Used in games, design activities 
Highly interactive
Artificial Intelligence  Computer programs that employee speech, reasoning, problem solving, and learning