OBJECTIVE:- -Define the term, computer security risks, and briefly describe the types of cybercrime perpetrators -Describe various types of Internet and network attacks, and identify ways to safeguard against these attacks -Discuss techniques to prevent unauthorized computer access and use -Identify safeguards against hardware theft and vandalism -Explain the ways software manufacturers protect against software piracy -Discuss how encryption works, and explain why it is necessary -Discuss the types of devices available that protect computers from system failure -Explain the options available for backing up computer resources -Identify risks and safeguards associated with wireless communications -Recognise issues related to information accuracy, intellectual property rights, codes of conduct, and green computing -Discuss issues surrounding information privacy Computer security risks- Any event or action that could cause a loss on data, hardware, information or processing capability Cybercrime is an online or Internet-based illegal act. such as, -Hackers -Crackers -Script Kiddies -Corporate spies -Unethical employees -Cyberextortionists -Cyberterrorists Types of Internet and networks attack:- -Computer Virus -Worm -Trojan horse -Rootkit Ways to safeguard against these attack: - -Never start a computer with removable media inserted in a drives or plugged in the ports, unless the media are uninfected -Scan all downloaded programs for viruses and other malware -Install a personal firewall program -Stay informed about new virus alerts and virus hoaxes Techniques to prevent unauthorized computer access and use: -
Safeguard Against hardware theft and vandalism:- -Physical access controls -Alarm system -Cables to lock equipment -Real time location -Passwords,possessed objects, and biometrics Encryption - A process of converting readable data into unreadable character to prevent unauthorized access Example of Encryption work:- 1)The senders create a document to be e-mail to the receiver 2)The sender use the receiver public key to encrypt a message 3)The receiver uses his or her private key to decrypt the message 4)The receiver can read or print the decrypted message Ways to protect from system failures:- -Surge protector -Uninterruptable power supplies Backup Definition: A duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed. For example, cloud storage Two categories of backup, which are, full backup and selective backup Wireless Security -A wireless access point should not broadcast an SSID -Change the default SSID -Configure a WAP so that only certain devices can access it -Use WPA or WPA 2 security standards Internet accuracy is a concern. Not all information in the internet is correct
Intellectual property rights are the rights to which creators are entitled for their work An IT code of conduct is a written guideline that helps determine whether a specific computer action is ethical or unethical Green Computing involves reducing the the electricity and environment waste while using computer Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them
0 Comments
Leave a Reply. |
Archives
October 2016
Categories |