Security and Ethics PDF
Document Details
Uploaded by Deleted User
Tags
Related
- BSc (Hons) Cyber Security Lecture 2 PDF
- Information and Communication Technology in the 21st Century PDF
- HC1_2024 Security Essentials 1 week 2 - Begrippenkader PDF
- ICT Security Threats - IT/CU/ICT/CR/3/6 - PDF
- Computer Security: Professional Issues-Emerging Technologies PDF
- Lecture 12 Intro to ICT Security PDF
Summary
This document provides an overview of computer and data security, including sources of security breaches such as malware (viruses, worms, spyware, Trojan horses), poor network implementation, and lack of ICT policies. It also details preventive measures like antivirus software and firewalls. The document further discusses ethical and legal issues related to the use and misuse of ICT.
Full Transcript
**SECURITY AND ETHICS** **Computer and Data security is the practice of keeping computer and data protected from corruption and unauthorized access.** **Sources of security breaches:** 1\. Malware (Virus, Worm, Spyware and Trojan horses) 2. Poor network implementation 3. Poor implementation o...
**SECURITY AND ETHICS** **Computer and Data security is the practice of keeping computer and data protected from corruption and unauthorized access.** **Sources of security breaches:** 1\. Malware (Virus, Worm, Spyware and Trojan horses) 2. Poor network implementation 3. Poor implementation or lack of ICT policies 4. Carelessness. 5\. Hackers, spammers, scammers, etc **1. Malware (Virus, Worm, Spyware and Trojan horses)** **Malware are malicious programs that used to gain access or damage a computer without the knowledge of the owner. there are different types of malware e.g Virus, worms, spyware, Trojan horse etc.** **Virus**: A computer virus attaches itself to a program or file so it can spread from one computer to another, leaving infections as it travels. It is important to note that a virus cannot be spread without a human action, (such as running an infected program) to keep it going. **Worms**: Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any help from a person. A worm takes advantage of file or information transport features on your system, which allows it to travel unaided. **Trojan horse**: A Trojan horse is not a virus. It is a destructive program that looks as a genuine application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. Trojans also open a backdoor entry to your computer which gives malicious users/programs access to your system, allowing confidential and personal information to be theft. **Spyware** is loosely defined as malicious software designed to enter your computer device, gather data about you, and forward it to a third-party without your consent. Spyware can also refer to legitimate software that monitors your data for commercial purposes like advertising. However, malicious spyware is explicitly used to profit from stolen data. **2. Poor network implementation:** Preventing network-based security breaches involve hardening the computer or reducing the network entry points that a malicious user can exploit. e.g Firewall **3. Poor implementation or lack of ICT policies**: ICT policy or network access policies that are too liberal will leave a computer network vulnerable to abuse and attack 4**. Carelessness:** Giving out personal and vital information on the net without careful screening 5. **Hackers, spammers, scammers, etc:** A [hacker] is a person who uses computers to gain unauthorized access to data.A [Spammer] is a person who send irrelevant messages to computer users using the internet as a medium with a motive of advertising, phishing or releasing malware. A [scammer] is a person who makes money using illegal methods, especially by tricking people. **[Preventive Measures]** 1. Use of antivirus software e.g Norton, McAfee, Avast, etc 2. Use of firewall: A firewall is a software utility or hardware device that acts as a filter for data entering or leaving a network or computer. 3. Exercising care in giving out vital and personal information 4. Proper network implementation and polices 5. Exercising care in opening email attachments. **[Ethics]** Ethics is a set of moral principles that govern the behaviour of a group or individual. Therefore, computer ethics is set of moral principles that regulate the use of computers. **[Legal Issues]** Legal issues are number of issues related to the use and misuse of ICT and its related fields. Some common LEGAL issues of include: 1. Intellectual property right: Intellectual** **property refers to creations of the mind. A right that is had by a person or by a company to have exclusive rights to use its own plans, ideas, or other intangible assets without the worry of competition, at least for a specific period of time. These rights can include copyrights, patents, trademarks, and trade secrets 2. Piracy: Software piracy is the illegal copying, distribution, or use of software. 3\. Effect of computers on society -- this covers factors such as job losses and social impacts and so on