Skip to main content

CHAPTER 5 (Digital Safety And Security)


CHAPTER 5 DIGITAL SAFETY AND SECURITY

Objectives Overview
1)    Define the term, digital security risks, and briefly describe the types of cybercriminals
2)     Describe various types of Internet and network attacks, and explain ways to safeguard against these attacks
3)    Discuss techniques to prevent unauthorized computer access and use
4)    Discuss how encryption, digital signatures, and digital certificates work
5)    Explain the ways that software manufacturers protect against software piracy
6)    Identify safeguards against hardware theft, vandalism, and failure
7)    Explain the options available for backing up
8)    Identify risks and safeguards associated with wireless communications

Digital Security Risks

Digital Security Risks : any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
Computer Crime : Any illegal act involving the use of a computer or related devices generally
Cybercrime : an online or Internet-based illegal act

For example >> Hacker, Cracker, Corporate spies, Unethical employees

Hacker
Cracker
Break the computer system with ethics to test the weakness of the system.

Deliberately breaks the system to bring damage and sabotage elements

Do not damage the system or destroy data

Unethical


Aggressive and dangerous


Internet And Network Attacks 

Malware : Malicious software
Firewall : Hardware and/or software that protects a network’s resources from intrusion

Unauthorized Access And Use 

Unauthorized Access
Unauthorized Access
The use of a computer or network without permission

the use of a computer or its data for unapproved or possibly illegal activities



Organizations take several measures to help prevent unauthorized access and use :
§  Acceptable use policy
§  Disable file and printer sharing

The computer, device, or network should maintain an audit trail  that records in a file both successful and unsuccessful access attempts :
§  User name
§  Password
§  Passphrase
§  CAPTCHA

Biometric device : Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
For example:
Ø  Fingerprint reader
Ø  Hand geometry system
Ø  Signature verification system
Ø  Iris recognition system

Digital Forensics : The discovery, collection, and analysis of evidence found on computers and networks
Many areas use digital forensics :
1)    Law enforcement
2)    Criminal prosecutors
3)    Military intelligence


Software Theft

Occurs when :
v  Steals software media
v  Intentially erases programs
v  Illegally copies a program

Information Theft 

Information theft : Occurs when someone steals personal or confidential information
Encryption : A process of converting data that is readable by humans into encoded characters to prevent unauthorized access
Digital signature : An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender
Digital certificate : A notice that guarantees a user or a website is legitimate

HARDWARE THEFT, VANDALISM AND FAILURE
1)    Hardware theft : The act of stealing digital equipment
2)    Hardware vandalism : the act of defacing or destroying digital equipment

To prevent this problem :

Hardware Theft and Vandalism Safeguards
-       Physical access controls (i.e, locked doors and windows)
-       Alarm system
-       Physical security devices (i.e, cables and locks)
-       Device-trscking apps

Hardware Failure Safeguards
-       Surge protector
-       Fault-tolerant computer
-       Uninterruptible power supply (UPS)

Backing Up – The Ultimate Safeguard 

Backup : A duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed

For example : Cloud storage

Ethics And Society

Computer ethics : The moral guidelines that govern the use of computers, mobile devices, and information systems
Code of conduct : A written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed

Information Private 

Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them

Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information

Spyware is a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online

Content filtering is the process of restricting access to certain material on the Web













Comments

Popular posts from this blog

CHAPTER 4 - Programs And Apps

CHAPTER 4 Programs and apps Objectives overview §   Identify the general categories of programs and apps §   Describe how an operating system interacts with applications and hardware §   Differentiate among the ways you can acquire programs and apps §   Identify key features of productivity applications §   Identify the key features of graphics and multimedia applications §   Identify the uses of personal interest applications §   Identify the purpose of software used in communications §   Identify the key features of security tools §   Identify the key features of file and disk management tools Program, Software and Application PROGRAM SOFTWARE APPLICATION A set of instructions telling a computer what to do. The programs and other operating information used by a computer. Software can be made up of more than one program. All-encompassing term that is often used in contrast to hardware ...

CHAPTER 8 (Digital Storage)

CHAPTER 8 Digital Storage  Storage Storage is the physical material on which a computer keeps data, information, programs, and applications. Cloud Storage   Another storage option, in which the actual online storage media used is transparent to the user. Access time measures :  - The amount of time it takes a storage device to locate an item on a storage medium  - The time required to deliver an item from memory to the processor Hard Disks v   A hard disk contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information. The characteristics of a hard disk include : 1)     Bezel 2)     Sealed chamber 3)     Disk platters 4)     Head arm 1)     Head actuator 2)     Drive electronics PCB 3)     Head electronics 4)     A...