Rabu, 5 September 2018

DISCOVERING COMPUTERS - Technology in a World of Computers, Mobile devices and Internet


CHAPTER 5 - DIGITAL SAFETY AND SECURITY

Digital Security Risks

  • A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
  • Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime
  • A cybercrime is an online or Internet-based illegal act

What is Hacker and Cracker?
Hacker is corporate spies and Cracker is unethical employees

The Difference between Hacker and Cracker


Internet and Network Attacks

  • Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premise
  • Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices


  • A firewall is hardware and/or software that protects a network’s resources from intrusion

Unauthorized Acess and Use

Unauthorized Acess → the use of a computer or network without permission
Unauthorized Use → the use of a computer or its data for unapproved or possibly illegal activities

  • Organizations take several measures to help prevent unauthorized access and use
    • Acceptable use policy
    • Disable file and printer sharing
  • Access controls define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
  • The computer, device, or network should maintain an audit trail  that records in a file both successful and unsuccessful access attempts
    • User name
    • Password
    • Passphrase
    • CAPTCHA
  • A possessed object is any item that you must carry to gain access to a computer or computer facility
    • Often are used in combination with a PIN (personal identification number)
  • A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
  • Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks
  • Many areas use digital forensics;-

Software Theft
  • Software theft occurs when someone:
    • Steals software media
    • Intentionally erases programs
    • Illegally registers and/or activates a program
    • Illegally copies a program
  • A single-user license agreement typically contains the following conditions:


Information Theft
  • Information theft occurs when someone steals personal or confidential information
  • Encryption is a process of converting data that is readable by humans into encoded characters to prevent unauthorized access


  • A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender
    • Often used to ensure that an impostor is not participating in an Internet transaction
  • A digital certificate is a notice that guarantees a user or a website is legitimate
  •  A website that uses encryption techniques to secure its data is known as a secure site
Hardware Theft, Vandalism and Failure

Hardware Theft→the act of stealing digital equipment
Hardware Vandalism→the act of defacing ot destroying digital equipment


  • To help reduce the of chances of theft, companies and schools use a variety of security measures

Backing Up – The Ultimate Safeguard
  • A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
    • To back up a file means to make a copy of it

Ethics and Society
  • Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems
  • Information accuracy is a concern
    • Not all information on the web is correct
  • A code of conduct is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
  • Green computing involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies
  • Content filtering is the process of restricting access to certain material on the Web
    • Many businesses use content filtering
  • Web filtering software restricts access to specified websites
Information Privacy
  • Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them
  • Huge databases store data online
  • It is important to safeguard your information














Tiada ulasan:

Catat Ulasan

Microsoft Powerpoint

MICROSOFT POWERPOINT? Apa benda tu? ↪Microsoft powerpoint ni ialah program persembahan yang dibangunkan oleh microsoft untuk digunakan pa...