Computer Security and Safety, Ethics, and Privacy
Computer Security and Safety, Ethics, and Privacy
The use of a computer or network Any item that you must carry to gain
without permission. access to a computer or computer
facility. A personal identification
Unauthorized Use number (PIN) is a numeric
password, either assigned by a • involves the examination of
company or selected by a user. computer media, programs, data
and log files on computers, servers,
Biometric Devices
and networks
authenticates a person’s identity by • digital forensics examiner must have
translating a personal characteristic, knowledge of the law, technical
such as a fingerprint, into a digital experience with many types of
code hardware and software products,
superior communication skills,
Hardware Theft and Vandalism familiarity with corporate structures
Hardware Theft and policies, a willingness to learn
and update skills, and a knack for
The act of stealing computer problem solving.
equipment.
Hardware Vandalism
Health Concerns of Computer Use
The act of defacing or destroying
computer equipment. A repetitive strain injury (RSI) is an injury or
disorder of the muscles, nerves, tendons,
ligaments, and joints. Computer-related
Software & Information Theft RSIs include tendonitis and carpal tunnel
syndrome.
Software theft
Computer Addiction
Occurs when someone steals
• Craves computer time
software media, intentionally erases
• Irritable when not at the computer
programs, illegally copies a program,
or illegally registers and/or activates • Overjoyed when at the computer
a program. • Unable to stop computer activity
• Neglects family and friends
Information Theft • Problems at work or school
Occurs when someone steals
personal or confidential information.
Digital Forensics