CHAPTER 5 - DIGITAL SAFETY AND SECURITY

What is digital security risk ?
Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.

Cybercrime is an online or Internet-based illegal act.

Types of cyber criminals are :

² Hacker
² Cracker
² Corporate spies
² Unethical employees

The difference between Hacker and Cracker

Hacker
Cracker
Break the computer system with ethics to test the weakness of the system  
Deliberately break the system to bring damage and sabotage elements
Do not damage the system or destroy data
Unethical, aggressive and dangerous

Types of Internet and network attacks

i. Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.


Ways to safeguard against these attacks

Firewall is hardware and/or software that protects a network’s resources from intrusion.

Techniques to prevent unauthorized computer access and use


Information theft occurs when someone steals personal or confidential information.

Encryption is a process of converting data that is readable by humans into encoded characters to prevent authorized access.


Secure site is a website that use encryption techniques to secure its data.



Hardware theft is the act of stealing digital equipment.

Hardware vandalism is the act of defacing or destroying digital equipment.

To help reduce the of chances of theft, companies and schools use a variety of security measures


Backing Up - The ultimate safeguard

Backup is doing a duplicate (to make a copy) file, program or media that can be used if the original is lost, damaged or destroyed.

Various type of backup


Ethics and Society

Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems.

Code of conduct
A written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.





Information privacy
Refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

How to safeguard personal information

Spyware
A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.

Adware
A program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services.

Content filtering


The process of restricting access to certain material on the Web. Usually use by the website business.

No comments:

Post a Comment

BLOG

Blog ialah singkatan untuk weblog. Merupakan satu catatan atau jurnal peribadi yang terdapat di jaringan internet.  Sentiasa dikemas ki...