Friday, September 7, 2018

CHAPTER 5: DIGITAL SAFETY AND SECURITY



Digital Security Risk


digital security risk = action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability
computer crime Any illegal act involving the use of a computer or related devices
A cybercrime = an online or Internet-based illegal act

Hacker vs Cracker ?



Internet and Network Attacks


- Information transmitted over networks has a higher security risk than information 
kept on an organization’s premises.
-Malware is a software, consists of programs that act without a user’s knowledge 
and deliberately alter the operations of computers and mobile devices.
-virus is dangerous  because it can damage our program. 

Figure 1.0 Virus on computer

Unauthorized Access and Use


-Unauthorized access is the use of a computer or network without permission
-Unauthorized use is the use of a computer or its data for unapproved or possibly illegal activities
-Organizations take several measures to help prevent unauthorized access and use
Acceptable use policy
Disable file and printer sharing
-The computer, device, or network should maintain an audit trail  that records in a file both successful and unsuccessful access attempts.
-A possessed object is any item that you must carry to gain access to a computer or computer facility
as example : smart card ( with a use of PIN number )
-A biometric device = translate person identity into digital code in a computer  
eg: fingerprint, voice recognition etc
-Digital forensics is the discovery, collection, and analysis of evidence found on computers
 and networks (investigate the crime technology )

Software Theft


-Software theft occurs when someone:
  •         steals software media
  •        intentionally erases programs
  •         illegally registers and/or activate a programs
  •         illegally copies a program
-A single-user license agreement typically contains the following conditions:

Figure 2.0 Single-User License Agreement

Information Theft



-Information theft occurs when someone steals personal or confidential information
-Encryption is a process of converting data that is readable by humans into encoded characters 
to prevent unauthorized access eg: whatsapp encryption code
Figure 3.0 Public Key Encryption

-A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender
Often used to ensure that an impostor is not participating in an Internet transaction
A digital certificate is a notice that guarantees a user or a website is legitimate
A website that uses encryption techniques to secure its data is known as a secure site eg: https//

Hardware Theft, Vandalism, and Failure


-Hardware theft is the act of stealing digital equipment
-Hardware vandalism is the act of defacing or destroying digital equipment
-To help reduce the of chances of theft, companies and schools use a variety of security measures

Figure 4.0 Security Measures

Backing Up – The Ultimate Safeguard


-A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
-Off-site backups(not inside the computer) eg: cloud storage


Figure 5.0 Various Backup Methods

Ethics and Society


-Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems.
-Information accuracy is a concern →Not all information on the web is correct.
-Digital rights management (DRM) is a strategy designed to prevent illegal distribution of 
movies, music, and other digital content.
-A code of conduct is a written guideline that helps determine whether a specification is
ethical/unethical or allowed/not allowed.

Figure 6.0 Sample IT
-Green computing involves reducing the electricity and environmental waste while using computers,
mobile devices, and related technologies.

Information Privacy


Information privacy refers to the right of individuals and companies to deny or restrict the 
collection and use of information about them.
Huge databases store data online.
It is important to safeguard your information.
Information about you can be stored in a database when you:
Fill out a printed or online form
Create a social networking profile
Register a product warranty
Phishing is a scam in which a perpetrator sends an official looking email message that attempts  
to obtain your personal and/or financial information.
Spyware is a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
Adware is a program that displays an online advertisement in a banner or pop-up window.
Employee monitoring is legal for employers to monitor the employees.
Content filtering is the process of restricting access to certain material on the Web
         Many businesses use content filtering
Web filtering software restricts access to specified websites









MICROSOFT EXCEL






•In the class we learn to make one worksheet by being taught and monitored. 

in the excel, we do not have to open another new sheet since we can just add new sheet in one excel. 

We are given a task as assignment by practice using the excel.