Hetalia Mochi - Russia

Thursday 20 September 2018

Chapter 5 : Digital Safety and Security


Computer crime
  •         Any illegal act involving the use of a device

Cybercrime
  • An online or Internet-based illegal act

Digital security risk
  • Action that cause a damage to the any device hardware, software and information

Security risk
Explanation
      Internet and network attacks    
  •  Malware is a programs that act without a user’s knowledge and deliberately alter the operations of device
  • Type of malware

§  Virus
§  Trojan horse
§  Adware
§  Spyware
  •  A firewall act as protections to a network’s resources from intrusion


     Unauthorized access and use
  • Unauthorized access use of network without permission
  • Unauthorized use use of data for unapproved or illegal activities

     Software theft     
     ·  Steals software media
     · Intentionally erases programs
     · Illegally registers and activates a program
     ·  Illegally copies a program

     Information theft
     · Occurs when someone steals personal or confidential information

     · Encryption  Process of converting data that is readable by humans into encoded characters to prevent unauthorized access

     ·  Digital signature An encrypted code that organization attaches to an electronic message to verify the identity of the sender
§  Often used to ensure that an impostor is not
   participating in an Internet transaction
     · A digital certificate A notice that guarantees a user or a website is legitimate

     · A secure site Website that uses encryption techniques to secure its data
      


     Hardware Theft, Vandalism, and Failure
     ·  Hardware theft  the act of stealing digital equipment
     ·  Hardware vandalism the act of defacing or destroying      digital equipment
     ·  Security measure help to reduce the chance of theft





Backing Up – The Ultimate Safeguard
  • Back up The duplicate of file that can be used when original lost

  •          Type of back up
§  Full back up
§  Differential back up
§  Incremental back up
§  Selective back up

Ethics and Society
  •  Computer ethics Moral guidelines that govern the use of devices and information systems
  •  A code of conduct Written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
  •  Green computing involves reducing the electricity and environmental waste while using devices, and related technologies



  • Content filtering
  •  Web filtering software

Information Privacy
  • The right of individuals and companies to deny or restrict the collection and use of information about them



Our information can be stored in database






No comments:

Post a Comment