Digital Security Risk
•digital
security risk = action that could cause a
loss of or damage to a computer or mobile device hardware, software, data,
information, or processing capability
•computer crime = Any illegal act involving the use of a
computer or related devices
•A cybercrime = an
online or Internet-based illegal act
Hacker vs Cracker ?
Internet and Network Attacks
- Information transmitted over networks has
a higher security risk than information
kept on an organization’s
premises.
-Malware is a software,
consists of
programs that act without a user’s knowledge
and deliberately alter the operations of computers and
mobile devices.
-virus is dangerous because it can damage our program.
Figure 1.0 Virus on computer |
Unauthorized Access and Use
-Unauthorized
access is the use of a computer or network without permission
-Unauthorized
use is the use of a computer or its data for unapproved or possibly illegal
activities
-Organizations take several measures to
help prevent unauthorized access and use
–Acceptable use policy
–Disable file and printer sharing
-The
computer,
device, or network should maintain an audit trail that records in a file
both successful
and unsuccessful access attempts.
-A possessed object is any item that you
must carry to gain access to a computer or computer facility
as example : smart card ( with a use of PIN number )
-A
biometric device = translate person identity into digital
code in a computer
eg: fingerprint, voice recognition etc
-Digital
forensics
is
the discovery, collection, and analysis of evidence found on computers
and
networks (investigate the crime technology )
Software Theft
-Software
theft
occurs
when someone:
- steals software media
- intentionally erases programs
- illegally registers and/or activate a programs
- illegally copies a program
-A single-user license agreement typically contains the following
conditions:
Figure 2.0 Single-User License Agreement |
Information Theft
-Information
theft occurs
when someone steals personal or confidential information
-Encryption
is a
process of converting data that is readable by humans into encoded characters
to prevent unauthorized access eg: whatsapp encryption code
Figure 3.0 Public Key Encryption |
–Often used to ensure that an impostor is
not participating in an Internet transaction
•A
digital certificate is a notice that guarantees a user or a
website is legitimate
•
A website that uses encryption techniques to secure its data is known as a secure site eg: https//
Hardware Theft, Vandalism, and Failure
-Hardware
theft is the act of stealing digital equipment
-Hardware
vandalism is the act of defacing or destroying digital equipment
-To help reduce the of chances of theft,
companies and schools use a variety of security measures
Figure 4.0 Security Measures |
Backing Up – The Ultimate Safeguard
-A backup
is a
duplicate of a file, program, or media that can be used if the original is
lost, damaged, or destroyed
-Off-site
backups(not inside the computer) eg: cloud storage
Figure 5.0 Various Backup Methods |
Ethics and Society
-Computer
ethics
are
the moral guidelines that govern the use of computers, mobile devices, and
information systems.
-Information accuracy is a concern →Not all information on the web is correct.
-Digital rights management (DRM) is
a strategy designed to prevent illegal distribution of
movies, music, and other
digital content.
-A code
of conduct
is a
written guideline that helps determine whether a specification is
ethical/unethical or allowed/not allowed.
Figure 6.0 Sample IT |
-Green
computing
involves
reducing the electricity and environmental waste while using computers,
mobile
devices, and related technologies.
Information Privacy
•Information
privacy refers
to the right of individuals and companies to deny or restrict the
collection
and use of information about them.
•Huge databases store data online.
•It is important to safeguard your
information.
•Information about you can be stored in a
database when you:
–Fill out a printed or online form
–Create a social networking profile
–Register a product warranty
•Phishing
is a
scam in which a perpetrator sends an official looking email message that
attempts
to obtain your personal and/or financial information.
•Spyware
is a
program placed on a computer or mobile device without the user’s knowledge that
secretly collects information about the user and then communicates the
information it collects to some outside source while the user is online.
•Adware
is a
program that displays an online advertisement in a banner or pop-up window.
•Employee monitoring is legal for employers to monitor the employees.
•Content
filtering
is
the process of restricting access to certain material on the Web
–Many businesses use content filtering
•Web
filtering software restricts access to specified websites