Is a written guideline that helps determine whether a specification is ethical

What is digital security risk ?

Any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.

Cybercrime is an online or Internet-based illegal act.

Types of cyber criminals are :

² Hacker

² Cracker

² Corporate spies

² Unethical employees

The difference between Hacker and Cracker

Hacker

Cracker

Break the computer system with ethics to test the weakness of the system  

Deliberately break the system to bring damage and sabotage elements

Do not damage the system or destroy data

Unethical, aggressive and dangerous

Types of Internet and network attacks

i. Malware, short for malicious software, consists of programs that act without a user’s knowledge and deliberately alter the operations of computers and mobile devices.

Is a written guideline that helps determine whether a specification is ethical

Ways to safeguard against these attacks

Firewall is hardware and/or software that protects a network’s resources from intrusion.

Techniques to prevent unauthorized computer access and use

Is a written guideline that helps determine whether a specification is ethical

Information theft occurs when someone steals personal or confidential information.

Encryption is a process of converting data that is readable by humans into encoded characters to prevent authorized access.

Is a written guideline that helps determine whether a specification is ethical

Secure site is a website that use encryption techniques to secure its data.

Is a written guideline that helps determine whether a specification is ethical

Hardware theft is the act of stealing digital equipment.

Hardware vandalism is the act of defacing or destroying digital equipment.

To help reduce the of chances of theft, companies and schools use a variety of security measures

Is a written guideline that helps determine whether a specification is ethical

Backing Up - The ultimate safeguard

Backup is doing a duplicate (to make a copy) file, program or media that can be used if the original is lost, damaged or destroyed.

Various type of backup

Is a written guideline that helps determine whether a specification is ethical

Ethics and Society

Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems.

Code of conduct

A written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

Is a written guideline that helps determine whether a specification is ethical

Information privacy

Refers to the right of individuals and companies to deny or restrict the collection and use of information about them.

How to safeguard personal information

Is a written guideline that helps determine whether a specification is ethical

Is a written guideline that helps determine whether a specification is ethical

Spyware

A program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online.

Adware

A program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services.

Content filtering



The process of restricting access to certain material on the Web. Usually use by the website business.

What is a written guideline that helps determine whether a specification is ethical unethical or allowed not allowed?

code of conduct. a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

Is a written guideline that helps determine whether a specific computer action is ethical or unethical?

An IT code of conduct is a written guideline that helps determine whether a specific computer action is which of the following?

What is unencrypted readable data called?

In computing, unencrypted data is also known as plaintext, and encrypted data is called ciphertext.

For what purpose was the BSA formed?

The BSA's stated purpose at its incorporation in 1910 was, to teach [boys] patriotism, courage, self-reliance, and kindred values. Later, in 1937, Deputy Chief Scout Executive George J.