CHAPTER 5 - DIGITAL SAFETY AND SECURITY
Digital Security Risks
- A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
- Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime
- A cybercrime is an online or Internet-based illegal act
What is Hacker and Cracker?
↬Hacker is corporate spies and Cracker is unethical employees
The Difference between Hacker and Cracker
Internet and Network Attacks
- Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premise
- Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
- A firewall is hardware and/or software that protects a network’s resources from intrusion
Unauthorized Acess and Use
Unauthorized Acess → the use of a computer or network without permission
Unauthorized Use → the use of a computer or its data for unapproved or possibly illegal activities
- Organizations take several measures to help prevent unauthorized access and use
- Acceptable use policy
- Disable file and printer sharing
- Access controls define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
- The computer, device, or network should maintain an audit trail that records in a file both successful and unsuccessful access attempts
- User name
- Password
- Passphrase
- CAPTCHA
- A possessed object is any item that you must carry to gain access to a computer or computer facility
- Often are used in combination with a PIN (personal identification number)
- A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
- Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks
- Many areas use digital forensics;-
Software Theft
- Software theft occurs when someone:
- Steals software media
- Intentionally erases programs
- Illegally registers and/or activates a program
- Illegally copies a program
- A single-user license agreement typically contains the following conditions:
Information Theft
- Information theft occurs when someone steals personal or confidential information
- Encryption is a process of converting data that is readable by humans into encoded characters to prevent unauthorized access
- A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender
- Often used to ensure that an impostor is not participating in an Internet transaction
- A digital certificate is a notice that guarantees a user or a website is legitimate
- A website that uses encryption techniques to secure its data is known as a secure site
Hardware Theft, Vandalism and Failure
Hardware Theft→the act of stealing digital equipment
Hardware Vandalism→the act of defacing ot destroying digital equipment
- To help reduce the of chances of theft, companies and schools use a variety of security measures
Backing Up – The Ultimate Safeguard
- A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
- To back up a file means to make a copy of it
Ethics and Society
- Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems
- Information accuracy is a concern
- Not all information on the web is correct
- A code of conduct is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
- Green computing involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies
- Content filtering is the process of restricting access to certain material on the Web
- Many businesses use content filtering
- Web filtering software restricts access to specified websites
Information Privacy
Tiada ulasan:
Catat Ulasan