Thursday 8 March 2018

Security Measure

Definition of security measures:

The precautionary measures taken toward possible danger or damage.


Security Measure
Explaination

Cryptography

Technology of encoding information so it can only be read by authorized individuals
Encryption
          Process of converting readable data into unreadable characters to prevent unauthorized access
Decryption
          Process to decode encrypted data.


Data Backup

       A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss.
       Data loss can be caused by many things ranging from computer viruses, hardware failures, file corruption, system failure or theft.

Antivirus

          Anti-virus software is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious software like worms, Trojan horses, adware and more.

Anti-spyware

          Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them.

Human Aspect : Awareness

          Ethics - Be a good cyber citizen
Do not engage in inappropriate conduct,
such as cyber bullying, cyber stalking or
rude and offensive behavior.
      Do not use someone else's password or        other identifying information.

Firewall
          A firewall is a system designed to prevent unauthorized access to or from a private network.

Physical Access Control

          Lock your laptop whether you're at home, in a dorm, in an office, or sitting in a coffee shop, use a security device, such as a laptop security cable.
          Lock doors and windows, usually adequate to protect the equipment.





Firewall

Data Backup

Cryptography

Types of Computer Security Risk

What is computer risk??


Any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.



Perpetrators of cybercrime and other intrusions fall into seven basic categories:


Cracker


    
Hacker









Corporate Spies






Script Kiddie
 
Unethical employees

Cyber Extortionist

Cyber Terrorist





There six of computer security risk:

Malicious Code
Unauthorized Access & Use
Software Theft
Hardware Theft
Information Theft
System Failure



MALICIOUS CODE
    •is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools.
      

     TROJAN HORSE

            •Similar to virus and worm but it does not spread or reproduce.
            •It looks similar to a software but will actually damage once installed or run it.
            •Can cause severe damage such as deleting file

                                                                            WORM

            •Worm is similar to virus but spreads without human action.
            •It gets multiplied or copied itself into hundred or thousands in number
            •Spread itself into other computers through mail or address box
          

     COMPUTER VIRUS

•Attached itself to a program or file which cannot spread without human action.
•When we run or open a file in which virus is present then it starts effecting and starts spreading.


UNAUTHORISED ACCESS & USE

Unauthorized access 
The use of a computer or network without permission.

                              •Unauthorized use 
The use of a computer or its data for unapproved or possibly illegal
activities.


                   SOFWARE THEFT

       •Software theft occurs when someone:
Steals software media
Intentionally erases programs
Illegally copies a program
Illegally registers and/or activates a program.



HARDWARE THEFT
Hardware theft is the act of stealing computer equipment.
Hardware vandalism is the act of defacing or destroying
computer equipment.
Companies, schools, and other organizations that house many computers, however, are at risk of hardware theft.


INFORMATION THEFT
Information theft occurs when
someone steals personal or
 confidential information.

If stolen, the loss of information
 can cause as much damage as
 (if not more than) hardware or
 software theft.

•An unethical company executive 
may steal or buy stolen 
information to learn about a 
competitor.

A corrupt individual may steal 
credit card numbers to make 
fraudulent purchases.


SYSTEM FAILURE
A system failure is the
 prolonged malfunction of a
 computer

Can cause loss of 
hardware, software, data, 
or information.

These include aging 
hardware; naturaldisasters 
such as fires, floods, or
 hurricanes; random events 
such as electrical
 power  problems; and
 even errors in computer 
programs.

Areas of Computer Ethics

WHAT DOES IT MEAN BY COMPUTER ETHICS???

The moral guidelines that govern the use of computers, mobile devices and information systems.


There 5 types of Areas of Computer Ethics


Information Accuracy


Green Computing



Intelectual Property



Information Privacy
Code of Conduct
           

             Information Accuracy

•One of the concern because many users access information maintained by
other people or companies.
Do not assume all the information on the Web is correct.
•Users should evaluate the value of a Web page before relying on its content.
•Be aware that the organization providing access to the information may not be the
creator of the information.


Green Computing

Environmentally responsible and eco-friendly use of computers and their resources.
In broader terms, it is also defined as the study of designing,
manufacturing/engineering, using and disposing of computing devices in a way that
reduces their environmental impact.


Intelectual Property

Unique and original works such as ideas, inventions, literary and artistic works,
processes, names and logos.

Or, refers to creations of the mind: inventions, literary and artistic works, and
symbols, names, images, and designs used in commerce.

Intellectual property rights are the rights to which creators are entitled for their
work.


Information Privacy

The right of individuals and companies to deny or
restrict the collection, use, and dissemination of
information about them.


Codes of Conduct

Written guideline that helps determine whether a specific action is ethical/unethical
or allowed/not allowed.





(Intellectual Property - IP)

  •                Patent
  •                Trademark
  •                Copyright
The importance of intelectual property:


To protect any original work that created by individual person/ company for
example, image, drawing, lyric, publishing and so on.
Preserve the features and processes that make things work. This lets
inventors profit from their inventions.

PATENT

A patent is a set of exclusive rights granted by a government to an inventor or
applicant for a limited amount of time (normally 20 years from the filing date).
Its a legal document defining ownership of a particular area of new technology.
Invention - a product or a process that provides a new way of doing something, or
offers a new technical solution to a problem.
The right granted by a patent excludes all others from making, using, or selling a
invention or products made by an invented process.   







COPYRIGHT

Protection provided to the authors of “original works” and includes such things
as literary, dramatic, musical, artistic, and certain other    intellectual creations, both
published and unpublished.







TRADEMARK
            Trademark is a word, phrase, symbol, design,          combination of letters or numbers, or
             other device that identifies and distinguishes   products and services in the marketplace.
              
          • Or a distinctive sign which identifies certain goods or services.
          •Or can be any distinctive name or logo.



Thursday 1 March 2018

Rules of Netiqquette

Today is the second day March , this week are very hectic because there are alot of assignment to do.What I have done to make sure my assignment can be done on time is arranging my time wisely.
So, today I would like to share about the rules of netiqquete..

Firstly,what do you mean about the netiquette?

Netiquette is ;


  • Refers to the etiquette of the internet
  • Is the code of acceptable behaviours users should follow while on the Internet or online or cyberspace.

  • Rules for all aspects of the:
    • World Wide Web
    • E-mail
    • Instant Messaging
    • Chat rooms
    • Newsgroups & message board

                     When do these rules apply?

              Anytime when you are using…

Chatting online 
Using email                               Social media
Using web
Internet messaging
FTP
Posting to a discussion
Blogging

Playing online games

So, there are alot of  guidelines netiquette for online communication.




       Rule 1: Remember the Human

         When communicating electronically, whether through email, instant message,           discussion post, text, or some other method, practice the Golden Rule: Do unto          others as you would have others do unto you. Remember, your written word
         are read by real people, all deserving of respectful communication. Before you            press "send" or "submit," ask yourself, "Would I be okay with this if someone              else had written it?"

       Rule 2: Adhere to the same standards of behavior online that you         follow in real life
While it can be argued that standards of behavior may be different in the virtual world, they certainly should not be lower. You should do your best to act within the laws and ethical manners of society whenever you inhabit "cyberspace." Would you behave rudely to someone face-to-face? On most occasions, no. Neither should you behave this way in the virtual world.


Rule 3: Know where you are in cyberspace
"Netiquette varies from domain to domain." (Shea, 1994) Depending on where you are in the virtual world, the same written communication can be acceptable in one area, where it might be considered inappropriate in another. What you text to a friend may not be appropriate in an email to a classmate or colleague. Can you think of another example?

Rule 4: Respect other people's time and bandwidth

Electronic communication takes time: time to read and time in which to respond. Most people today lead busy lives, just like you do, and don't have time to read or respond to frivolous emails or discussion posts. As a virtual world communicator, it is your responsibility to make sure that the time spent reading your words isn't wasted. Make your written communication meaningful and to the point, without extraneous text or superfluous graphics or attachments that may take forever to download.

Rule 5: Make yourself look good online

One of the best things about the virtual world is the lack of judgment associated with your physical appearance, sound of your voice, or the clothes you wear (unless you post a video of yourself singing Karaoke in a clown outfit.) You will, however, be judged by the quality of your writing, so keep the following tips in mind:
  • Always check for spelling and grammar errors
  • Know what you're talking about and state it clearly
  • Be pleasant and polite

Rule 6: Share expert knowledge

The Internet offers its users many benefits; one is the ease in which information can be shared or accessed and in fact, this "information sharing" capability is one of the reasons the Internet was founded. So in the spirit of the Internet's "founding fathers," share what you know! When you post a question and receive intelligent answers, share the results with others. Are you an expert at something? Post resources and references about your subject matter. Recently expanded your knowledge about a subject that might be of interest to others? Share that as well.

Rule 7: Help keep flame wars under control

What is meant by "flaming" and "flame wars?" "Flaming is what people do when they express a strongly held opinion without holding back any emotion." (Shea, 1994). As an example, think of the kinds of passionate comments you might read on a sports blog. While "flaming" is not necessarily forbidden in virtual communication, "flame wars," when two or three people exchange angry posts between one another, must be controlled or the camaraderie of the group could be compromised. Don't feed the flames; extinguish them by guiding the discussion back to a more productive direction.

Rule 8: Respect other people's privacy

Depending on what you are reading in the virtual world, be it an online class discussion forum, Facebook page, or an email, you may be exposed to some private or personal information that needs to be handled with care. Perhaps someone is sharing some medical news about a loved one or discussing a situation at work. What do you think would happen if this information "got into the wrong hands?" Embarrassment? Hurt feelings? Loss of a job? Just as you expect others to respect your privacy, so should you respect the privacy of others. Be sure to err on the side of caution when deciding to discuss or not to discuss virtual communication.

Rule 9: Don't abuse your power

Just like in face-to-face situations, there are people in cyberspace who have more "power" than others. They have more expertise in technology or they have years of experience in a particular skill or subject matter. Maybe it's you who posesses all of this knowledge and power! Just remember: knowing more than others do or having more power than others may have does not give you the right to take advantage of anyone. Think of Rule 1: Remember the human.

Rule 10: Be forgiving of other people's mistakes

Not everyone has the same amount of experience working in the virtual world. And not everyone knows the rules of netiquette. At some point, you will see a stupid question, read an unnecessarily long response, or encounter misspelled words; when this happens, practice kindness and forgiveness as you would hope someone would do if you had committed the same offense. If it's a minor "offense," you might want to let it slide. If you feel compelled to respond to a mistake, do so in a private email rather than a public forum.



Do not spam



Use the emoticons



Use the abbereviation



Be polite

Cegah Covid-19