Thursday 20 October 2016

CHAPTER-11 MANAGE COMPUTING SECURELY SAFELY AND ETHICALLY



 A computer security risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

A cybercrime is an online or Internet-based illegal act like :-
  • ·       Hacker-Someone who access a computer illegally.
  • ·       Cracker- Has intention of destroying data, stealing information
  • ·       Script kiddies- Same intention with cracker but does not have skills to use prewritten hacking program
  • ·  Corporate Spies- Someone who is hired to break into specific computer to steal its property data
  • ·      
  • ·       Unethical Employees- Someone break into their employee computer for various reason. Example – feel financial gain from selling
  • ·       Cyber extortionist- Someone who uses email as a vehicle for extorts.
  • ·  Cyber terrorists- Someone use Internet/network/to destroy or damage computers for political reason.


An online security service is a Web site that evaluates your computer to check for Internet and e-mail vulnerabilities.

A botnet is a group of compromised computers connected to a network.

A compromised computer is known as a zombie.

A denial of service attack (DoS attack) disrupts computer access to Internet services.

Distributed DoS (DDoS) :-
A back door is a program or set of instructions in a program that allow users to bypass security controls.

Spoofing is a technique intruders use to make their network or Internet transmission appear legitimate.

A firewall is hardware and/or software that protects a network’s resources from intrusion.

Organizations take several measures to help prevent unauthorized access and use :-
·       Acceptable use policy
·       Disable file and printer sharing
·       Firewalls
·       Intrusion detection software

Access controls define who can access a computer, when they can access it, and what actions they can take.

Two-phase processes called identification and authentication :-
  • ·       User name
  • ·       Password
  • ·       Passphrase
  • ·       CAPTCHA 

A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer.

Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks.

Information theft occurs when someone steals personal or confidential information.

Encryption is a process of converting readable data into unreadable characters to prevent unauthorized access.

A digital signature is an encrypted code that a person, Web site, or organization attaches to an electronic message to verify the identity of the sender. Often used to ensure that an impostor is not participating in an Internet transaction.

Web browsers and Web sites use encryption techniques

Two ways to protect from system failures caused by electrical power variations include :-
  • ·       surge protectors
  • ·       uninterruptable power supplies (UPS) 

A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. To back up a file means to make a copy of it. Offsite backups are stored in a location separate from the computer site.

Green computing involves reducing the electricity and environmental waste while using a computer.

Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them. Huge databases store data online. It is important to safeguard your information.

Spam is an unsolicited e-mail message or newsgroup posting. E-mail filtering blocks. E-mail messages from designated sources. Anti-spam programs attempt to  remove spam before it reaches your inbox.


2 comments: