Skip to main content

CHAPTER 5 (Digital Safety And Security)


CHAPTER 5 DIGITAL SAFETY AND SECURITY

Objectives Overview
1)    Define the term, digital security risks, and briefly describe the types of cybercriminals
2)     Describe various types of Internet and network attacks, and explain ways to safeguard against these attacks
3)    Discuss techniques to prevent unauthorized computer access and use
4)    Discuss how encryption, digital signatures, and digital certificates work
5)    Explain the ways that software manufacturers protect against software piracy
6)    Identify safeguards against hardware theft, vandalism, and failure
7)    Explain the options available for backing up
8)    Identify risks and safeguards associated with wireless communications

Digital Security Risks

Digital Security Risks : any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
Computer Crime : Any illegal act involving the use of a computer or related devices generally
Cybercrime : an online or Internet-based illegal act

For example >> Hacker, Cracker, Corporate spies, Unethical employees

Hacker
Cracker
Break the computer system with ethics to test the weakness of the system.

Deliberately breaks the system to bring damage and sabotage elements

Do not damage the system or destroy data

Unethical


Aggressive and dangerous


Internet And Network Attacks 

Malware : Malicious software
Firewall : Hardware and/or software that protects a network’s resources from intrusion

Unauthorized Access And Use 

Unauthorized Access
Unauthorized Access
The use of a computer or network without permission

the use of a computer or its data for unapproved or possibly illegal activities



Organizations take several measures to help prevent unauthorized access and use :
§  Acceptable use policy
§  Disable file and printer sharing

The computer, device, or network should maintain an audit trail  that records in a file both successful and unsuccessful access attempts :
§  User name
§  Password
§  Passphrase
§  CAPTCHA

Biometric device : Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
For example:
Ø  Fingerprint reader
Ø  Hand geometry system
Ø  Signature verification system
Ø  Iris recognition system

Digital Forensics : The discovery, collection, and analysis of evidence found on computers and networks
Many areas use digital forensics :
1)    Law enforcement
2)    Criminal prosecutors
3)    Military intelligence


Software Theft

Occurs when :
v  Steals software media
v  Intentially erases programs
v  Illegally copies a program

Information Theft 

Information theft : Occurs when someone steals personal or confidential information
Encryption : A process of converting data that is readable by humans into encoded characters to prevent unauthorized access
Digital signature : An encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender
Digital certificate : A notice that guarantees a user or a website is legitimate

HARDWARE THEFT, VANDALISM AND FAILURE
1)    Hardware theft : The act of stealing digital equipment
2)    Hardware vandalism : the act of defacing or destroying digital equipment

To prevent this problem :

Hardware Theft and Vandalism Safeguards
-       Physical access controls (i.e, locked doors and windows)
-       Alarm system
-       Physical security devices (i.e, cables and locks)
-       Device-trscking apps

Hardware Failure Safeguards
-       Surge protector
-       Fault-tolerant computer
-       Uninterruptible power supply (UPS)

Backing Up – The Ultimate Safeguard 

Backup : A duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed

For example : Cloud storage

Ethics And Society

Computer ethics : The moral guidelines that govern the use of computers, mobile devices, and information systems
Code of conduct : A written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed

Information Private 

Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them

Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information

Spyware is a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online

Content filtering is the process of restricting access to certain material on the Web













Comments

Popular posts from this blog

CHAPTER 3 (Computer And Mobile Device)

Chapter 3 Computers and Mobile Device Objectives Overview §   Describe the characteristics and uses of desktops, laptops, tablets, and handheld computers. §   Describe the characteristics and types of server §   Differentiate among POS terminals, ATMs, and self-service kiosks §   Describe cloud computing and identity its uses §   Describe the characteristics and uses of smartphone, digital cameras, portable media player, and e-book readers §   Describe the characteristics of and ways to interact with game device §   Identify uses of embedded computers §   Differentiate a port from a connector, identify various ports and connectors, and differentiate among Bluetooth, Wi-Fi, and NFC wireless device connections. Types of computers include : 1.  Desktop and mobile computers 2.  Servers and terminals 3.  Smartphones, digital cameras, e-book readers and portable 4.  Game devices 5.  Embedded computers Desktops And Mobile Comput

CHAPTER 4 - Programs And Apps

CHAPTER 4 Programs and apps Objectives overview §   Identify the general categories of programs and apps §   Describe how an operating system interacts with applications and hardware §   Differentiate among the ways you can acquire programs and apps §   Identify key features of productivity applications §   Identify the key features of graphics and multimedia applications §   Identify the uses of personal interest applications §   Identify the purpose of software used in communications §   Identify the key features of security tools §   Identify the key features of file and disk management tools Program, Software and Application PROGRAM SOFTWARE APPLICATION A set of instructions telling a computer what to do. The programs and other operating information used by a computer. Software can be made up of more than one program. All-encompassing term that is often used in contrast to hardware A program or group of programs that is desi

CHAPTER 6 (Inside Computers And Mobile Devices)

CHAPTER 6 INSIDE COMPUTERS AND MOBILE DEVICES Objective Overview 1)     Describe the various computer and mobile device cases and the contents they protect 2)     Describe multi-core processors the components of a processor, and the four steps in a machine cycle 3)     Explain the advantages and services of cloud computing 4)     Define a bit, and describe how a series of bits represents data 5)     Describe the purpose of adapter cards, USB adapters, and ExpressCard modules 6)     Explain the purpose of a power supply and batteries 7)     Understand how to care for computers and mobile devices Inside The Case  Desktop ·          Motherboard : The main circuit board of the computer ·          Video card ·          Sound card ·          Processor Memory module ·          Power supply and fan Laptop ·          Battery ·          Processor ·          Memory module ·          Integrated sound parts and circuity Proc