Emtech Lesson 3
Emtech Lesson 3
CLOUD COMPUTING
RGEEENNCVOC
CONVERGENCE
ROCIMGGGOLBIN
MICROBLOGGING
LIAOCS
IAEDM
SOCIAL MEDIA
AAEEDTCNTRS
DATACENTERS
IAEPRVT
DUOLC
PRIVATE CLOUD
NAOIRDD
ANDROID
IIUEDSTRBTD
SRVRSEE
DISTRIBUTED
SERVERS
BIMYSNA
SYMBIAN
BBRRLAEYLCK
SO
BLACKBERRY OS
03
Online Safety, Security
and Rules of Netiquette
Lesson 3
Think about it!
Meet us
Security Requirement Triad
• Confidentiality
Data Confidentiality
Privacy
• Integrity
Data Integrity and System
Integrity
• Availability
Misuse: Causes a system component to
perform a function or service that is
detrimental to system security.
Types of System Intruders
• Masquerader
• Hackers
• Clandestine user
Parts of Virus
• Infection mechanism
• Trigger
• PayloaD
VIRUS STAGES
• Dormant phase
Virus is idle.
• Propagation phase
• Virus places an identical copy of itself into other
programs or into certain system areas on the disk.
VIRUS STAGES
• Triggering phase
Virus is activated to perform the function for which it
was intended. Caused by a variety of system events
• Execution phase
• Function is performed
KEY TERMS
• Keyword searching
• Boolean
AND – enter words connect with AND- it will include sites where both
words and found
Uses: joining different topics (i.e. global warming AND California)
OR – requires at least one of the terms is found.
Uses: join similar or synonymous topics (i.e. global warming OR
greenhouse effect)
NOT – searches for the first term and excludes sites that have the second
term.
(i.e. Washington NOT school)
Four search strategies
• Question
a question may be entered in the search field of search
engine
• Advanced
Features are offered on many engines by going to an
“Advanced search” page and making selections. Effective in
narrowing search returns to a specific topic or phrase.
THANK YOU !
Meet us