CHAPTER 5: DIGITAL SAFETY AND SECURITY

CHAPTER 5: DIGITAL SAFETY AND SECURITY

A digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability

Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime


A cyber crime is an online or Internet-based illegal act

Example of Security risk:
  • Internet and network attacks
  • unauthorized access and use
  • hardware theft
  • software theft
  • information theft
  • system failure
Hacker, cracker, corporate spies and unethical employees
Hacker:a person who uses computers to gain unauthorized access to data.

Cracker:a person who breaks into someone else's computer system, often on network.

Corporate spies: a person who obtain secret and information of a holder without permissions or knowledge of the holder.

Unethical employees: a person who breaks the law of ethical by stealing,selling or receiving secrets or information of company

Internet and Network Attacks

Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises

Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices
Types of Malware:
  • Virus:a potentially damaging program that affects or infects a computer or mobile
  • Worm:copies itself repeatedly.
  • Trojan horse:A program that hides within an legitimate program
  • Rootkit:a program that hides in a computer or mobile device to allow someones fully control the devices.
  • Spyware:a person who collects an information about the user while the user is online 
  • Adware:A program that displays an online advertisement on email,webpages or other internet services.


A firewall is hardware and/or software that protects a network’s resources from intrusion

Unauthorized Access and Use


Organizations take several measures to help prevent unauthorized access and use
-Acceptable use policy
-Disable file and printer sharing

Access controls define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

The computer, device, or network should maintain an audit trail  that records in a
file both successful and unsuccessful access attempts:
  • User name
  • Password
  • Passphrase
  • CAPTCHA


A possessed object is any item that you must carry to gain access to a computer or computer facility
Often are used in combination with a PIN (personal identification number)
  • Atm card
  • Token

A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer

Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.
Many areas use digital forensics

Software Theft
Many manufacturers incorporate an activation process into their programs to ensure the software is not installed on more computers than legally licensed
During the product activation, which is conducted either online or by phone, users provide the software product’s identification number to associate the software with the computer or mobile device on which the software is installed
A single-user license agreement typically contains the following conditions:

Information Theft
Information theft occurs when someone steals personal or confidential information
Encryption is a process of converting data that is readable by humans into encoded characters to prevent unauthorized access.

A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender
-Often used to ensure that an impostor is not participating in an Internet transaction
A digital certificate is a notice that guarantees a user or a website is legitimate
 A website that uses encryption techniques to secure its data is known as a secure site

Hardware Theft, Vandalism, and Failure

To help reduce the of chances of theft, companies and schools use a variety of security measures

Backing Up – The Ultimate Safeguard
A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
To back up a file means to make a copy of it
Off-site backups are stored in a location separate from the computer or mobile device site

Ethics and Society
Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems

Information accuracy is a concern
-Not all information on the web is correct
Intellectual property refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos

Intellectual property rights are the rights to which creators are entitled to their work
A copyright protects any tangible form of expression

Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content


A code of conduct is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed


Green computing involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies



Information Privacy
Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them
Huge databases store data online
It is important to safeguard your information

Information about you can be stored in a database when you:
  • Fill out a printed or online form
  • Create a social networking profile
  • Register a product warranty


Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information
With clickjacking, an object that can be clicked on a website contains a malicious program


Spyware is a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online
Adware is a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services


Content filtering: is the process of restricting access to certain material on the Web
Many businesses use content filtering

Web filtering software restricts access to specified websites


Comments

Popular posts from this blog

CHAPTER 3: COMPUTER AND MOBILES DEVICE

CHAPTER 7: INPUT AND OUTPUT

CHAPTER 4:PROGRAMS AND APPS