Computer
crime
- Any illegal act involving the use of a device
Cybercrime
- An online or Internet-based illegal act
Digital
security risk
- Action that cause a damage to the any device hardware, software and information
Security risk
|
Explanation
|
Internet and network attacks
|
§ Virus
§ Trojan horse
§ Adware
§ Spyware
|
Unauthorized
access and use
|
|
Software theft
|
· Steals software media
· Intentionally erases programs
· Illegally registers and activates a program
· Illegally copies a program
|
Information theft
|
· Occurs when someone steals personal or
confidential information
· Encryption ─ Process of converting data that is readable
by humans into encoded characters to prevent unauthorized access
· Digital signature ─ An encrypted code that
organization attaches to an electronic message to verify the identity of the
sender
§ Often used to
ensure that an impostor is not
participating in an Internet transaction
· A digital
certificate ─ A notice that guarantees
a user or a website is legitimate
· A secure
site ─ Website that
uses encryption techniques to secure its data
|
Hardware Theft,
Vandalism, and Failure
|
· Hardware theft ─ the
act of stealing digital equipment
· Hardware vandalism ─ the act of defacing or destroying digital
equipment
· Security measure help to
reduce the chance of theft
|
Backing Up – The Ultimate Safeguard
- Back up ─ The duplicate of file that can be used when original lost
- Type of back up
§
Full back up
§
Differential back up
§
Incremental back up
§
Selective back up
Ethics and Society
- Computer ethics ─ Moral guidelines that govern the use of devices and information systems
- A code of conduct ─ Written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed
- Green computing involves reducing the electricity and environmental waste while using devices, and related technologies
- Content filtering
- Web filtering software
Information Privacy
- The right of individuals and companies to deny or restrict the collection and use of information about them
Our information can be stored in
database
No comments:
Post a Comment