Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats PDF
Document Details
Tags
Summary
This document provides an overview of digital security, ethics, and privacy. It covers topics such as cybercrime, digital forensics, and the risks associated with technology use. The information is useful for understanding the ethical considerations and security risks of using various devices and technologies.
Full Transcript
**Module 5** **Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats** A digital security risk is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability. Types of digital security risk...
**Module 5** **Digital Security, Ethics, and Privacy: Avoiding and Recognizing Threats** A digital security risk is any event or action that could cause a loss of or damage to computer or mobile device hardware, software, data, information, or processing capability. Types of digital security risks include threats to our: *information\ physical health\ mental health\ environment* **Risks associated with technology use** **Cybercrime** - An intentional breach of digital security often involves a deliberate act that is against the law. Any illegal act involving the use of a computer or related devices generally is referred to as a\ computer crime. Software used by cybercriminals sometime is called crimeware. **Digital forensics** - also called cyber-forensics, is the discovery, collection, and analysis of evidence found on computers and networks. Digital forensics involves the examination of media, programs, data and log files on computers, mobile devices, servers,\ and networks. A **digital forensics examiner** must have knowledge of the law, technical experience with many types of hardware and software products, superior communication skills, familiarity with corporate structures and policies, a willingness to learn and update skills, and a knack for problem solving. **Digital detox** - is a period of time during which an individual refrains from using technology. Participation in a digital detox has behavioral health benefits, including better sleep, less anxiety, and more productive thoughts.\ A break from devices also can help alleviate physical problems such as eye strain and repetitive stress injuries. **Cybercrimes and Criminals** \- the technical term for these thieves is threat actor, a more general and common\ term used to describe individuals who launch attacks against other users and their computers is simply attackers. The **Dark web** is a part of the web that is accessed using specialized software, where users and website operators can remain anonymous while performing\ illegal actions. **Script kiddies** are individuals who\ want to attack computers but lack the knowledge of computers and networks needed to do so. Script kiddies instead do their work by downloading freely\ available automated attack software (scripts) from websites and using it to perform malicious acts. **Hacker** is a person who intends to access a computer system without permission. Although originally a\ complimentary word for a computer enthusiast, hacker now has a derogatory meaning and refers to someone who accesses a computer or network illegally. **Cracker** also is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action. **Hactivists** attacks can involve breaking into a website and changing the contents on the website as a means of making a political statement. **Cyberterrorists** - they attack a nation\'s computer networks, like the electrical power grid, to cause disruption and panic\ among citizens. **Cyberwarfare** - describes an attack whose goal ranges from disabling a government\'s computer network to crippling a country. **Cyberterrorism and cyberwarfare** - usually requires a team of highly skilled individuals, millions of dollars, and several years of planning.\ These attackers try to steal and then use your credit card numbers, online financial account information, or Social Security numbers using data mining. **Data mining** - is the process of sifting through Big Data to find the important questions that will yield fruitful\ results. they can pretend to be you and buy expensive items online while charging\ them to your credit card or break into your bank account to transfer your money to another account. **Cyberextortionist** - is an individual who attacks a nation\'s computer networks, like the electrical powergrid, to cause disruption and panic among citizens. **Social engineering** - is a category of attacks that attempts to trick the victim into giving valuable information to the attacker. Ethics and Society ================== Technology ethics are the moral guidelines that govern the use of computers, mobile devices, information\ systems, and related technologies. **Green Computing**\ Enterprise data centers and computer facilities consume large amounts of electricity from computer hardware and associated devices and utilities, such as\ air conditioning, coolers, lighting, and so on. Internet and network attacks ============================ Internet and network attacks that\ jeopardize security include malware, botnets, denial of service attacks, back doors, and spoofing. **Spyware**- program placed on a computer\ or mobile device without the user\'s\ knowledge that secretly collects\ information about the user and\ then communicates the information it collects to some outside source while the user is online. **Worm** - program that copies itself\ repeatedly, for example in memory\ or on a network, using up resources\ and possibly shutting down the\ computer, device, or network. **Back Doors** - back door is a program or set of instructions in a program that allows users to bypass security controls when accessing a program, computer, or\ network. **Denial of Service Attacks** - denial of service attack (DoS attack) is a type of\ attack, usually on a server, that is meant to overload the server with network traffic so that it cannot provide necessary services, such as the web or email. A **virtual private network (VPN**) - is a private, secure path across a public network that allows authorized users secure access to a company or other network. **Firewalls** - Organizations use firewalls to protect network resources from outsiders and to restrict employees\' access to sensitive data, such as payroll or personnel\ records. **Biometric security** - uses the unique characteristics of your face, hands, or eyes to authenticate you. **Content filtering** - is the process of restricting access to certain material. Module 6\ **toggle key** - is a key that will alternate views or turn a feature on or off each time you press it. Caps lock and Num lock are examples of toggle key. **Ergonomic keyboard** - has a design that reduces the change of repetitive strain injuries of the wrist and hand. **Trackball -** is a stationary pointing device with a ball on its top or side. **Digital camera** - touch input helps digital camera users to perform gestures such as swiping left and right on the screen to browse photo tapping the screen to identify the area on which as user wishes to focus. **Stylus** - A stylus is a small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink. **Voice Input** - is the process of entering input b speaking unto a microphone. **Motion-sensing devices** - communicate with a game console or a personal computer using wired or wireless technology. The console or computer\ translates a player\'s natural gestures, facial movements, and full-body motion into input. **Optical scanner** - usually called a scanner, is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process. **OCR (optical character recognition)** - which converts text to digital text so that it can be edited, copied, and searched directly within the program. OCR software converts a scanned image to a text file that can be edited, for example, with a word processing application. A **QR code (quick response code)** - known as a 2-D bar code because it stores information in both a vertical and\ horizontal direction in a square-shaped graphic that represents a web address or other content, such as contacts or phone numbers. **MICR Readers** - an MICR (magnetic-ink character recognition) device reads text printed with magnetized ink. An MICR reader converts MICR characters into a form the computer can process. **Magstripe reader** - short for magnetic stripe card reader, reads the magnetic stripe on the back of credit cards,\ entertainment cards, bank cards, identification cards, and other similar cards. The stripe contains information\ identifying you and the card issuer. **Ink-Jet Printers** - ink-jet printer is a type of nonimpact printer that forms characters and graphics by spraying tiny drops of liquid ink onto a piece of paper. Ink-jet\ printers are a popular type of color printer for use in the home. **thermal printer** - generates images by pushing electrically heated pins against heat-sensitive paper. Basic thermal printers are inexpensive, but the print quality is low, the images tend to fade over time, and thermal paper can be expensive. **Smart TV** - is an Internet-enabled\ HDTV from which you can browse the web, stream video from online media services, listen to Internet radio, communicate with others on online social media, play online games, and more --- all while watching a television show, Using a Smart TV, you can stream content from the TV to other Internet-enabled\ devices, such as a tablet or smartphone, and use cloud storage services to share content. **Data projectors** - A data projector is a device that projects the text and images displaying on a computer or mobile device screen on a larger screen so that an audience can see the image clearly. For example, many classrooms use data projectors so that all students easily can see an instructor\'s presentation on the\ screen. Module 7 ======== **Cloud storage**- keeps information on servers on the Internet, and the actual media on which the files are stored are transparent to the user. **storage device** - is the hardware that records and/or retrieves items to and from storage media. **Access time -** the time it takes for a computer to retrieve data from storage after a request is made Measures:\ -- The amount of time it takes a storage device to locate an\ item on a storage medium\ -- The time required to deliver an item from memory to the\ processor **Zettabyte** -- (ZB) a digital unit of measurement. 1 sextillion 270 or 1,180,591,620,717,411,303,424 An **SSD (solid state drive)** - is a flash memory storage device that contains its own processor To manage its storage\ SSD (solid state drive) has several advantages over traditional (magnetic) hard disks:\ -- Faster access times\ -- Faster transfer rates\ -- Quieter operation\ -- More durable **RAID (redundant array of independent disks)** - is a group of two or more integrated hard drives. RAID duplicates data, instructions, and information to\ improve data reliability. **RAM** - RAM is a common computing acronym that stands *for random-access memory*.it is volatile that is, its contents are erased when power is removed from a computer or mobile device. A **head crash** - it occurs when a read/write head touches the surface of a platter. Any contaminant could render the disk unusable. A **CD-RW** - is an erasable multisession disc. **Network attached storage (NAS)** - is a server that is placed on a network with the sole purpose of providing storage to users, computers, and devices\ attached to the network. **storage area network (SAN)** - is a high-speed network with the sole purpose of providing storage to other attached servers. **RFID tag** - consists of an antenna and a\ memory chip that contains the information to be transmitted via radio waves. Haha mg and koni makit an sa modules, ginoogle ko nalang ======================================================== **Force Feedback** - refers to the vibration of a device (such as gamepads or controllers), often being used in games to convey a force occurring in the game to the player. **LCD** stands for *Liquid Crystal Display* - a type of flat panel display technology that uses liquid crystals to create images on a screen. LCDs are used in many electronic devices, including televisions, computer monitors, smartphones, and more. A **wireless microphone** - is an input device that transmits a speaker\'s voice without a physical connection to a sound system. **Phishing** -is a type of online scam that involves tricking people into revealing personal information or installing malware. **SDHC** in Micro SDHC cards stands for *Secure Digital High Capacity* - these tiny cards can contain between 2GB and 32GB of data. Many cell phones use Micro SDHC cards to provide consumers with the option to expand their device\'s memory. **signature capture pad** - is a device that records a person\'s signature electronically and stores it. The user signs on an LCD touchpad with a pen-type stylus, and the pad\'s sensor reads the stylus\'s pressure to capture the signature. The signature data is then sent to a computer. **foot mouse** - is a computer input device that lets users control their computer with their feet instead of their hands. It\'s also known as a foot-operated mouse or slipper mouse. **Formatting** - involves erasing all the data on the disk and preparing it for use by your computer. This can be done by using the formatting tool built into your operating system or by using a disk utility. **DVD** or *Digital Versatile Disc* - a type of compact disc able to store large amounts of data, especially high resolution [audiovisual](https://www.google.com/search?sca_esv=fec1343659b7b2ee&sxsrf=ADLYWIJfI_BM_1vF-Ol-Of0R_LpEDzp3sQ:1731494914521&q=audiovisual&si=ACC90nwZrNcJVJVL0KSmGGq5Ka2YbXCM1QeAvIbhIrWwNbO4XdPnOAlcycFj_ZuyZdIc3OY547-GtiPEAwSh9Ka5rP4q0oOYct3NYeFTW_QCzBEAWeUsqkE%3D&expnd=1&sa=X&ved=2ahUKEwjKzb2akdmJAxVq5DQHHZg6A0UQyecJegQIOBAN) material. ** LINUX** - a Unix-like, open source and community-developed operating system (OS) for computers, servers, mainframes, mobile devices and embedded devices. **File manager** - is a computer program that allows users to organize and manipulate files and folders on a computer. Multi-user operating system (OS) - allows multiple users to access the same system at the same time. Real-Time Operating System (RTOS) - is a specialized software that manages tasks with strict timing requirements. RTOSs are different from general-purpose operating systems because they prioritize tasks based on deadlines, ensuring that critical operations are completed promptly and predictably. Device Manager - is a central tool in a computer system that allows users to view, configure, and manage hardware devices efficiently. A memory manager - is a software that manages a computer\'s memory, including how it\'s allocated, tracked, and reclaimed. Memory management is important for advanced computer systems that have multiple processes running at once. **Network operating system (NOS)** - is a type of software that manages network resources and allows devices on a network to communicate and share resources. **Process Manager** - is a component in the operating system that enhances the kernel\'s process and thread objects by adding identifiers, statistics, and other information related to the management of processes and threads. **Operating system (OS) virtualization** - is a technology that allows multiple operating systems to run on a single server simultaneously. **MacOS** - is the computer operating system (OS) for Apple desktops and laptops. It is a proprietary graphical OS that powers every Mac. **Web filtering software**, also known as content control software - is a tool that monitors and controls a user\'s online activity. It can block or allow access to certain websites or content based on predefined criteria **Crowdsourcing** - is the practice of gathering information, work, or opinions from a large group of people to create or improve products, services, or processes.