Computer, Health & Environment Risks
Computer, Health & Environment Risks
Objective #6: Various other Computer Security, Health and Safety, and
Environmental risks and threats
This may be defined as any method, process or means used to maliciously attempt to
compromise the security of the network. Internet and Network Attacks takes many forms and can
be detrimental to a computer system and the resources that are stored on such systems. One such
attack is that of malware, which is a series of programs that act without a user's knowledge and
deliberately alter the operations of internet and network connectivity.
Denial of Service attack (DoS attack) is another attack used on internet and network. DoS
disrupts computer access to services on the internet; thus, blocking Internet Protocol connections
to occur. Spoofing is another attack in which unauthorized users manipulate a network or
internet connection, making it seems legitimate. Popular adware is another means that is used in
internet and network attack. It is a program that displays an online advertisement in a banner or
pop-up window on webpages, email messages or other internet services.
Unauthorized access and use of computer system is a breach of computer security and is deemed
as computer crime. Unauthorized access is often carried out by hackers, who maliciously and
intently gain access to website, program, server, or other system and stealing or corrupting
pertinent information. These acts are normally done using the account or identity of someone
else, for example: (hacking into someone’s Facebook account posting and pretending to be
them).
Unauthorized access could also occur if a user attempts to access an area of a system they should
not be accessing. When attempting to access that area, they would be denied access and possibly
see an unauthorized access message.
Hardware Theft and Vandalism
While many small business owners are concerned with data loss through cyber-attacks such as
malware and hacks, physical hardware theft and loss are also risks. Whether by accidental loss or
through malicious intent, loss of a laptop, mobile device, or storage device such as backup tapes,
hard drives, and flash drives can represent crushing blows to business data security. Whether a
business loses intellectual property, personal customer data, or business data, a data breach can
result in high costs, loss of reputation, and lost advantage on the market.
There are malware creators that devote time and effort to acts of computer vandalism that can
damage your computers and data, and affect the services that businesses deliver.
Cybervandalism is damage or destruction that takes place in digital form, in most cases, the
cyber vandals may deface a website (such as Wikipedia), create malware that damages electronic
files or elements that interrupt its normal utilization or remove a disk drive to disable a computer
system. Vandalism only seeks to damage, destroy or disable data, computers or networks.
Vandalism can impact businesses drastically, including the ability of customers to access
services as well as financial loss or impact to business brand or reputation.
There are different types of software theft that takes place ever so often. One way in which
software theft occur is when the physical media is stolen, inclusive of software or the hardware.
Another method of software theft is when the service of a programmer is unexpectedly
terminated by a company. The programs written by company programmers are exclusive to the
companies they work for, but a few dishonest programmers deliberately wipe out or disable the
programs written by them using the company infrastructure. Software piracy is another means of
software theft, in which software becomes stolen or tampered with illegally or without the
knowledge of the creator. This leads to unauthorized copying of copyrighted software, and
causing a software creator or company to lose well deserved profits.
Hard copy information is increasingly less common, as the transition to digital content is now a
popular practice. Though often protected by a password, most information is stored on a shared
network. As a result, a hacker could gain access to the network and obtain valuable information
that could put individuals or businesses at risk.
System Failure
The risk of system failure brings about pop ups and warning messages, which indicates that a
computer system is unable to carry out a specific task or unable to prevent malware from
spreading on a computer system. A blue screen is a popular result of system failure, which is
visible when a computer system is prevented from booting up. System failure prevents a user or
business from record tracking of internet browsing history. A detrimental effect of system failure
leads to crash of a computer system. This is when a computer either refuses to boot up or
abruptly power off when in use.
System failures may result from a hard drive with bad sectors, causing the operating system to
not be able to read data from the hard drive. A failing motherboard can cause a system failure
because the computer is not able to process requests or operate in general. A bad processor can
and usually causes a system failure because the computer cannot operate if the processor is not
working properly or at all. A bad RAM chip can also cause system failures because the operating
system is not able to access data stored on the RAM chip.
Computers are complex electronic devices, which may contain defects from time to time. One
such defect that may affect devices are that of constant reboots. This often occurs when there is a
break in communication with computer memory. Another defect is that computer system crashes
each time an application is accessed. Screen flickers are another defect that affects devices, and
as a result reduces the ability to use the device, as the flicker may have effects on the eye. Other
screen defects may be that applications cannot be accessed on the screen, especially in the case
of touch screen, because the touch sensor won't respond. Battery problems is a major device
defect, as battery life tends to be limited, resulting in a computer system or mobile device to
remain on charge during the usage.
Software Glitches or Bugs
A software glitch or bug is a flaw, failure, error or fault in a computer software or system that
causes it to return unexpected or incorrect results. Software bugs cause problems ranging from
stability issues to operability problems, and are usually due to human errors during the
programming process. If there is incorrect or inaccurate coding within software or an app, it can
cause problems ranging from invalid output to completely crashing the software in question
(locking it up or causing it to close unexpectedly). Software bugs may cause the software to
completely lock up or crash, but may also cause erroneous output without crashing the software.
Health & Safety Risks including:
Repetitive Strain Injury
Repetitive strain injury (RSI) refers to pain felt in muscles, nerves and tendons caused by
repetitive movement and overuse. It is also known as work-related upper limb disorder, or non-
specific upper limb pain. The condition mostly affects parts of the upper body, such as the:
forearms and elbows, wrists and hands and neck and shoulders
Carpal tunnel syndrome (CTS) is a medical condition that affects the wrists. This in turn
leads to numbness and muscle weakness in the hand. CTS prolong or become excessive
when persons do not have proper ergonomic practices, such as keyboard arrangement,
seating arrangement and typing without taking breaks.
Computer Vision Syndrome (CVS) relates to problem with the eyes, specifically vision. This
happens when persons use computers for long periods of time, without moving from in front
the screen or blinking often. The eyes become strained and these prevents persons from
getting adequate sleep, so the eye muscles can rest properly. An effect of CVS is that it may
block blood to properly flow to the eyes, which contributes to blurry vision or unable to see
objects or words, whether near or far.
Computer Addiction
Computer addiction is a disorder in which the individual turns to the Internet or plays
computer games in an attempt to change moods, overcome anxiety, deal with depression,
reduce isolation or loneliness, or distract themselves from overwhelming problems. The
elderly, as well as children and adolescents, are particularly vulnerable because they may not
realize the extent of their dependency. In many instances, individuals with computer
addiction may seek help for another condition, such as depression, phobias or other
addictions.
Environmental Risks including:
Energy Consumption
After lighting, computers and monitors have the highest energy consumption in office
environments. The energy consumption of computers and monitors is determined by the amount
of energy they require to operate and how they are used. While the energy requirements of a
device make an important contribution to its overall energy consumption, the key to reducing
energy consumption is changing how devices are used.
Approximately half of all office computers are left on overnight and on weekends, which results
in dramatically increase in their energy consumption. These devices, when left on can become
overheat and worst-case scenario, cause electrical attachments to catch fire.
Electronic waste, or e-waste, refers to electronic products that no longer satisfy the needs of the
initial purchaser. These can include a wide variety of goods, such as computers, cellular phones
and other devices. The continuous dependence on electronic equipment at home and in the
workplace has given rise to a new environmental challenge. Electronic waste is one of the
emerging problems in developed and developing countries worldwide. It comprises of a
multitude of components with valuable materials, some containing toxic substances, that can
have an adverse impact on human health and the environment. Although electronic equipment is
considered safe during use, the potential for release of the toxic constituents increases during
storage or disposal. In general, electronic gadgets are meant to make our lives happier and
simpler, but the toxicity it contains, their disposal and recycling becomes a health nightmare.
electronic waste.
References
Bray, M. (2006, December). Review of Computer Energy Consumption and Potential Savings.
Retrieved from
https://www.dssw.co.uk/research/computer_energy_consumption.html#_Toc29375313
https://www.computerhope.com/jargon/s/systemfa.htm
https://www.goodfirms.co/glossary/software-bug/
https://www.nhs.uk/conditions/repetitive-strain-injury-rsi/
Peralta, G.L. &., Fontanos, P.M. (2006, March). E-waste issues and measures in the Philippines.
Threat Sketch. (2017, August 16). The True Cost of Missing Hardware: Protecting Yourself
from
Utica College. (2017). Ten Ways Evolving Technology Affects Cybersecurity. Retrieved from
https://programs.online.utica.edu/articles/ten-ways-evolving-technology-affects-
cybersecurity-0321