Hye! Today I will share about Computer ethics and Security. But first, do you know what is
Computer ethics and Security? Have you ever heard about Computer ethics
Security? 'No'? Or maybe 'yes' but don't know what does it actual mean? Okay,
don't worry! Let me introduce you to Computer ethics and Security.
chapter 4 : computer ethics and security
4.1 COMPUTER ETHICS
what is computer ethics?
Computer Ethics are the moral guidelines that
oversee the use of computers and information systems
4.1.1 netiquette
what is nettique
• Netiquette, (short for Internet
etiquette), is the code of acceptable behaviors users should follow while on
the Internet.
OR
• Netiquette is the code of
acceptable Internet behavior.
Netiquette includes rules for all aspects of the
Internet services, including:
- The World Wide Web
- Instant messaging
- Chat rooms
- Newsgroups and message boards.
- Social Media
- FTP
4.1.2 area of computer ethics
Information Accuracy is a measure of the
reliability of information held within an IT system
Green Computing involves reducing the electricity
and environmental waste while using
computers.
Codes of Conduct is a written guideline that helps
determine whether a specific computer action is ethical or unethical.
Intellectual property (IP) refers to unique and
original works such as logos, brands, ideas, inventions, art, writings,
process, company and product names.
Information Privacy refers to the right of
individuals and companies to deny or restrict the collection and use of
information about them.
COMPUTER SECURITY
what is computer security?
A computer security risk is any action that could
cause a loss of or damage to computer hardware, software, data, information, or
processing capability.
types of security risks
- Malware / Malicious Code
Information transmitted over
networks has a higher degree of security risk than information kept on an
organization’s premises
Internet and network attacks that
are exposed to security include :
(a) Malware / Malicious Code
Malware is malicious software, which are programs that act without a
user’s knowledge and deliberately /purposely
alter the computer’s operations.
Types of Malware :
*Computer viruses
*Worms
*Trojan Horses
SYMPTOMS OF MALWARE/ MALICIOUS CODE
TYPES OF MALWARE
•Computer Viruses
A potentially damaging program that affects, or infects a
computer or mobile device negatively by altering the way the computer or device
works without the user's knowledge or permission.
Once the virus infects the computer, it can spread
throughout and may damage files and system software, including the operating
system.
•Worms
A program that copies itself repeatedly, for example in
memory, using up resources and possibly shutting down the computer, device or
network.
•Trojan Horse
A program that hides within or looks like a legitimate
program. Unlike a virus or worm, a
trojan horse does not replicate itself to other computers or device.
It usually appears to be a game or utility program.
Cannot replicate themselves; must be downloaded and
installed.
*images above is one of the lab activities science computer which is produce bulletin
okay just this for today.. so.. lets protect our computer ^_^