Wednesday 5 October 2016

COMPUTER ETHICS AND SECURITY

Hye! Today I will share about Computer ethics and  Security. But first, do you know what is Computer ethics and Security? Have you ever heard about Computer ethics Security? 'No'? Or maybe 'yes' but don't know what does it actual mean? Okay, don't worry! Let me introduce you to Computer ethics and Security.
chapter 4 : computer ethics and  security
4.1 COMPUTER ETHICS 
       what is computer ethics?
Computer Ethics are the moral guidelines that oversee the use of computers and information systems

4.1.1 netiquette 
what is nettique 
      Netiquette, (short for Internet etiquette), is the code of acceptable behaviors users should follow while on the Internet.
                        OR
      Netiquette is the code of acceptable Internet behavior.

Netiquette includes rules for all aspects of the Internet services, including:
  • The World Wide Web
  • E-mail
  • Instant messaging
  • Chat rooms
  • Newsgroups and message boards.
  • Social Media
  • FTP
4.1.2 area of computer ethics 


Information Accuracy is a measure of the reliability of information held within an IT system
Green Computing involves reducing the electricity and environmental waste while using  computers.
Codes of Conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical.
Intellectual property (IP) refers to unique and original works such as logos, brands, ideas, inventions, art, writings, process, company and product names.
Information Privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them.


COMPUTER SECURITY
what is computer security?

A computer security risk is any action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

types of security risks 
  1.         Malware / Malicious Code

Information transmitted over networks has a higher degree of security risk than information kept on an organization’s premises
Internet and network attacks that are exposed to security include :
     (a) Malware / Malicious Code
     Malware is malicious software, which are programs that act without a user’s knowledge and deliberately /purposely  alter the computer’s operations.
Types of Malware :
*Computer viruses
*Worms
*Trojan Horses

SYMPTOMS OF MALWARE/ MALICIOUS CODE 

TYPES OF MALWARE

Computer Viruses
A potentially damaging program that affects, or infects a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.

Worms
A program that copies itself repeatedly, for example in memory, using up resources and possibly shutting down the computer, device or network.


Trojan Horse
A program that hides within or looks like a legitimate program.  Unlike a virus or worm, a trojan horse does not replicate itself to other computers or device.

It usually appears to be a game or utility program.

Cannot replicate themselves; must be downloaded and installed.




*images above is one of the lab activities science computer which is produce bulletin

okay just this for today.. so.. lets protect our computer ^_^ 


No comments:

Post a Comment