What is digital security risk ?
Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.
Cybercrime is an online or Internet-based illegal act.
Types of cyber criminals are :
² Hacker
² Cracker
² Corporate spies
² Unethical employees
The difference between Hacker and Cracker
Hacker
|
Cracker
|
Break the computer system with ethics to test the weakness of the system
|
Deliberately break the system to bring damage and sabotage elements
|
Do not damage the system or destroy data
|
Unethical, aggressive and dangerous
|
Types of Internet and network attacks
i. Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.
Ways to safeguard against these attacks
Firewall is hardware and/or software that protects a network’s resources from intrusion.
Techniques to prevent unauthorized computer access and use
Information theft occurs when someone steals personal or confidential information.
Encryption is a process of converting data that is readable by humans into encoded characters to prevent authorized access.
Secure site is a website that use encryption techniques to secure its data.
Hardware theft is the act of stealing digital equipment.
Hardware vandalism is the act of defacing or destroying digital equipment.
To help reduce the of chances of theft, companies and schools use a variety of security measures
Backing Up - The ultimate safeguard
Backup is doing a duplicate (to make a copy) file, program or media that can be used if the original is lost, damaged or destroyed.
Various type of backup
Ethics and Society
Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems.
Code of conduct
A written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
Information privacy
Refers to the right of individuals and companies to deny or restrict the collection and use of information about them.
How to safeguard personal information
Spyware
A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.
Adware
A program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services.
Content filtering
The process of restricting access to certain material on the Web. Usually use by the website business.
No comments:
Post a Comment