Tuesday 18 October 2016

CHAPTER 11

MANAGE COMPUTING SECURELY, SAFELY AND ETHICALLY

Computer Security Risk


A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability


A cyber crime is an online or Internet-based illegal act.

Example of cyber crime:

  • HAckers
  • Crackers
  • Script kiddies
  • Corporate spies
  • Unethical employees
  • Cyberterrorist
  • Cyberextortionists

Internet and Network Attacks
  • Computer virus
  • Worm
  • Trojan horse
  • Rootkit

Firewall is hardware and/or software that protects a network’s resources from intrusion


Hardware theft is the act of stealing computer equipment

Hardware vandalism is the act of defacing or destroying computer equipment


Software Theft occurs when:
  • Steals software
  • Intentionally erases programme
  • Illegally copies a programme
  • illegally register and/or activate a programme

Information theft occurs when someone steals personal or confidential information

Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.


 Security techniques
  • Digital certificates
  • Secure HTTP
  • Transport Layer Secuirty(TLS)
  • VPN

Backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed and to back up a file means to make a copy of it.
Offsite backups are stored in a location separate from the computer site such as in cloud storage.


Computer ethics are the moral guidelines that govern the use of computers and information systems.


Green computing is the environmentally responsible and eco-friendly use of computers and their resources. In broader terms, it is also defined as the study of designing, manufacturing/engineering, using and disposing of computing devices in a way that reduces their environmental impact.

Image result for green computing



A cookie is a small text file that a Web server stores on your computer.
 
Purposes of using Cookies
  •         Allow for personalization
  •         Store user's password
  •         Assist with online shopping
  •         Track hows often users visit a site
  •         Target advertisments






No comments:

Post a Comment