1) This document provides guidelines for securing hardware, software, and data on a computer. It discusses insuring hardware against damage or theft and using security cables and locks.
2) Software can be protected by backing up data regularly onto external drives or disks in case the original files become corrupted. Firewalls can also protect data from internet intruders.
3) Regular system maintenance is important, such as checking that components are powered on and cables are securely connected if issues arise. Signs of problems include error messages, lights flashing, or no output from printers or monitors.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
23 views5 pages
IT Midterm Lecture1
1) This document provides guidelines for securing hardware, software, and data on a computer. It discusses insuring hardware against damage or theft and using security cables and locks.
2) Software can be protected by backing up data regularly onto external drives or disks in case the original files become corrupted. Firewalls can also protect data from internet intruders.
3) Regular system maintenance is important, such as checking that components are powered on and cables are securely connected if issues arise. Signs of problems include error messages, lights flashing, or no output from printers or monitors.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
COMPUTER SKILLS AND PROTOCOL Here are some guidelines of hardware and software
Midterm Lecture 1 security:
1) Hardware can be secured through insurance Introduction policies – if your PC is taken or damaged you can In the industrialized countries of the world, the avoid potential risk to guarantee that you will be "information revolution" as of now has essentially able to replace it. changed numerous parts of life: in banking and trade, work and business, clinical consideration, national 2) You can help limit the hazard to your hardware by guard, transportation and entertainment. Therefore, guaranteeing that you lock your office/room and information technology innovation has started to close the window before you leave. influence (in both good and bad ways) community life, family life, human relationships, education, freedom, 3) Security cable can likewise be utilized to secure democracy, and so on. Computer ethics in the broadest your PC and hardware down. sense can be comprehended as that part of applied morals which studies and dissects such social and 4) Your software will likely have been from CD and moral effects of data innovation. in the event that it becomes corrupted you ought to have the option to re-install it from your Ten commandments of computer ethics are the set original disks (just make sure that these you kept of moral standards that govern the use of it in a safe place). computers. It is society's perspectives about the utilization of computers, both hardware and 5) To limit the impact of occurrences like losing your software. Privacy concerns, intellectual property data/information, you ought to back up all of your rights and impacts on the general public are a data/information on your HDD, flash-drive, CD- portion of the common issues of computer ethics. R/CD-RW or whole drive to DVD or external drive regularly. This basic computer skills and protocol topic will provide you with an understanding of the current 6) To protect your data/information from intruders technologies used at home and in the workplace. on the Internet you should install a firewall which We will explain terminology and impart best serves as a protection between the Internet and practice skills for productive and secure utilization your computer. of hardware and software of our computer. We System Maintenance (Stephen, 2008) will also discuss about system maintenance, Stephen (2008) stated that as computer are such an password protection, legal issues and computer integral part of our lives, you should be able to do at virus. least a little basic system maintenance. Even if you are not confident trying to fix things for yourself, knowing Hardware and Software Security (Stephen, 2008) what to check and what to look for can be useful when According to Stephen (2008) a lot of individuals discussing any problems, you encounter. use and depend on computers, to be aware of threats and security of devices and COMPONENTS NOT WORKING data/information. It is important that users take If your computer doesn’t seem to be working, the first appropriate steps to lessen the danger from these things to check are: threats. Your computer devices and data on it, is a Power – make sure that the plugs are in the sockets very important resource. Therefore, it is important and that they are switched on. that you look after it and take safety measures to Connections – make sure that all the cables are guarantee that, everything happens, you can connected properly. The mouse, keyboard, screen, and recover it from the circumstance. printer should be attached to the computer’s system box. Computer security can take two forms: software Hardware Switched On – many computers have and hardware security. Software security provides switched on the actual monitor and printer – so if they barriers and other cyber-tools that protect don’t seem to be working, check that they are actually programs, files, and the data/information flow to switched on. and from a computer. Hardware security protects the machine and peripheral hardware from theft ERRORS INDICATORS and from electronic intrusion and damage. Your computer will give you clues when something is wrong. These include: Flashing Lights – e.g. on a printer to indicate a paper jam Nothing Appearing on the Monitor – indicating that 3) You must be able to identify the computer as your it is switched off, or the screen saver has kicked in or property: there is some other problem (a) have a unique identifying tag affixed; Bleeps – when you ask your PC to perform some task (b) record the serial number of the system unit that it can’t do. in another location and No Printer Output – if there is no paper or the printer (c) put a tracking software. is switched off No Pointer – when mouse is disconnected or missing ✓ PROTECTING YOUR COMPUTER from or faulty ELCTRICAL DAMAGE (Stephen, 2008) No Message on the Screen – telling you of the 1. Computer components operate on low-voltage problem. direct current, which they get by converting higher-voltage alternating current provided by Tips on Taking Care of Your Personal Computers local utilities. (Stephen, 2008) 2. (from Brownouts and Power Outages): Using In the modern world, almost of the households have Uninterruptible Power Supply (UPS) their own desktop, personal computers, because 3. (from Voltage Differences while Travelling): computers are very important. It is very useful in Using Transformers and Plug Adapters education, business, research, and other functions. As 4. (from Static Electricity): Your hands ad body computer users, we must always take care of our 56 must be the same charge as the system unit case computers. ✓ PROTECTING YOUR COMPUTER from In this lesson we will discuss the basic care and SURGES (Stephen, 2008) maintenance of your computers (Stephen, 2008). 1) Using power strips (extension cords with 1. Do not leave the computer running nightlong. additional receptacles indicates the presence of 2. Turn off the screen monitor, printer and other circuit breaker. devices once not in use. 2) Using surge suppressor – blocks sudden changes 3. Avoid extreme temperatures in voltage. 4. Clean your computer weekly 5. Do not block ventilation ✓ PROTECTING YOUR COMPUTER from 6. Use a reliable antivirus program OVERHEATING (Stephen, 2008) 7. Keep smoke and dust from getting inside the 1. The system units are equipped with fans to move computer outside air through the case and over the 8. Keep beverages away from the keyboard components 9. Plug the computer into a dedicated power line if 2. Special rooms with air-conditions possible 3. Do not place a computer in an enclosed space 10. Install a built-in disk tool where the heat is trapped (example: desks cabinet, armoires and closets) ✓ PROTECTING YOUR COMPUTER from PHYSICAL DAMAGE (Stephen, 2008) ✓ PROTECTING STORAGE MEDIA from Should be always carried in protective cases. MAGNETIC FIELDS (Stephen, 2008) 1) Magnetic fields can affect the beam of electrons ✓ PROTECTING YOUR COMPUTER from from CRT monitor and distort the picture HUMIDITY (Stephen, 2008) 2) Hard disk is most sensitive to the influence of 1. Allow the computer to warm up to an ambient magnetic field Examples of Magnetic Field: temperature before you turn it on. Refrigerator magnets 2. Printer is one example of peripherals that is very Cones of speakers sensitive to humidity which Electric currents like those on powerful motors causes paper jam and sparks
✓ PROTECTING YOUR COMPUTER from ✓ IDENTIFYING COMMON PROBLEMS that
THEFT (Stephen, 2008) may be avoided by Regular Cleaning(Stephen, 1) Special anti-theft devices such as cables with 2008) locks can secure the computer to its physical ➢ Overheating due to dust accumulation location Processor is overheating (sending out beeps through 2) Companies or educational institutions may have a the systems unit speaker) policy that requires locked doors and limited ➢ Sticky keyboard access to rooms. ➢ Malfunctioning mouse or trackball ➢ Printing problems due to clogged Ink Jets or Dirty Legal Issues (Stephen, 2008) Rollers There are also a number of legal issues that computer users should be aware of: Password Protection (Stephen, 2008) Copyright – In simpler terms, copyright is the Stephen (2008) explained that when working in right to copy. Copyright protects the legal right of a networked environment you will use a user ID and a the proprietor’s intellectual property. This implies password to access the system, these are used to the original inventors of products and anyone they recognize you. These rights give you access to the give authorization to are the only ones with the drives that you have to use to read and/or write to file exclusive right to reproduce the work. documents. There are different levels of password Software copyright legislation is in place to give protection accessible to ensure that authorized users the authors and developers of software the same only can access the system and open and edit the files rights as authors of published written or musical held on it. works. When you buy a software, you don’t actually purchase the package, just a license that ➢ User-Level allows you to use the software. The terms of the 1. Password protection can be given at a user level licence are known as the End User Licence (through the operating system) accordingly, only Agreement (EULA). authorized users can access the system. With this kind of password protection, the PC will pause as Freeware - is software that is free to use. Not like it boots up and you need to enter your username commercial software, it doesn’t need any payment and password before you can go any further. or licensing fee. It is similar to shareware package, 2. Careful consideration ought to be given to the however it won’t eventually ask you for payment passwords that you use to confirm that they can’t to continue using the software. You can legally be guessed easily. download and use freeware for as long as you Don’t use things somebody can connect with you want without having to pay for it. (e.g. your name or your child’s), your birth date or Note: If you use shareware or freeware try to ensure vehicle registration. that it comes from a reputable source or is Use a combination of letters, numbers and even recommended in PC magazine, etc. the software may symbols characters with the minimum length, (e.g. not have been tested as thoroughly as commercial 8 characters) that you can recall yet that you think software and it may contain bugs or viruses. There is it will be hard for someone to guess. however some very good, useful and safe shareware Don’t tell anybody about your password and and freeware software available – just be careful! change it regularly. Open Source – refers to any program whose ➢ Folder/ Directories source code is made available for use or Some folders on the file server can be shared to some modification as users or other developers see fit. users, they can have access also to your files. To Open source software is typically developed as a ensure that authorized users only access those files, public collaboration and created freely available passwords might be used (Stephen, 2008). under a copyright license. Users are permitted to 1. Files - If you have documents on any PC (not just use, change and improve the software and to on a network) that you don’t want other users to redistributes it is modified or unmodified form. view or edit, you may be able password-protect them (most present-day applications allow the Data Protection Act – The Data Protection Act user to password-protect individual files). 1984 Purpose of the Act. The Act gives new rights 2. USB / Flash Drive – you can likewise protect the to people about whom data/information is contents of some memory sticks by assigning a recorded on PC; individuals may find out password to them. The contents can be checked if information about themselves, challenge it if you enter the correct password. appropriate and claim compensation in specific 3. Screen Saver – screen saves were originally conditions. designed to prevent the visual display unit (VDU) from becoming damaged as a result of a static Computer Viruses and Anti- Viruses image being displayed on it for a long period of (slideplayer.com, n.d.) time. When a password is set, you will have to enter the password to cancel the screen saver. What is COMPUTER VIRUS? ✓ Computer virus refers to a program which damages 7. Trojan Horse Virus - is a kind of malware that is computer systems and/or destroys or erases data files. ( often disguised as real software. Trojans can be www.slideplayer.com ) utilized by cyber-thieves and hackers attempting ✓ A computer virus is software that has been written to gain access to clients’ systems. Users are with the specific purpose of causing havoc on typically tricked in some form it pretends as computer systems. It is called a virus because it has computer games or application software, been programmed to 61 spread through the system and whenever executed, computer system will be on to other computer systems, just like an infectious damaged. Usually comes with monitoring tools virus spread through the general population. and key loggers, for example a saxophone.wav ✓ Some virus may be harmless, they do no serious file that interests a person gathering sound damage to your system, but serve to remind you just samples of instruments. how vulnerable your system may be. Other viruses can have disastrous effects, deleting files, corrupting disk, DISADVANTAGES OF COMPUTER VIRUS etc. (slideplayer.com, n.d.) TYPES OF COMPUTER VIRUS Format hard disk (slideplayer.com, n.d.) Copy, rename and delete files 1. Time Bomb - is a virus program that plays out an Modify files dates and extensions action on a specific date. A malicious program Display false message every few times that is programmed to "detonate" at a specific time Damage data and release a virus onto the computer system or Damage software network. COMPUTER ANTI-VIRUS (Stokes &Johnston, 2. Logical Bomb - is a destructive program that 2020) performs an activity when a certain action has Antivirus software is a computer program that happened. It is sometimes referred to as slag code, distinguishes, prevents, and takes action to disarm or is a string of malicious code used to cause harm to remove malicious software programs, such as viruses a network. and worms. Antivirus software helps protect your computer against malware and cybercriminals, looks at 3. Worm - is a kind of malware that spreads data in a web pages, files, software, applications duplicates of itself from computer to computer. A traveling over the network to your devices. It searches worm is also a destructive program that fills a for known threats and monitors the behavior of all computer system with self-replicating programs, flagging suspicious behavior. It seeks to data/information, obstructing the system so that its block or remove malware as fast as could reasonably operations are slowed down or stopped. be expected. 4. Boot Sector Virus - infects boot sector of computers or boot sector of floppy disks or the Stokes and Johnston (2020). There are so many Master Boot Record (MBR) of hard disks (some anti-viruses which works against viruses but some infect the boot sector of the hard disk instead of anti-viruses are trusted and are very famous. There the MBR). During system boot, the boot sector are 10 ranked anti viruses by viruses infect at a BIOS level, they use DOS www.toptenreviews.com commands to spread to other floppy disks. 1. Bit Defender Anti-Virus 2. Kaspersky Anti-Virus 5. Macro Virus - is a computer virus written in the 3. Norton Anti-Virus similar full-scale language that is utilized for 4. F-Secure Anti-Virus software applications, such as word processing 6. BullGuard Anti-Virus (MS Word) and spreadsheet (MS Excel) 7. G-Data Anti-Virus programs. When opening the infected document, 8. Panda Anti-Virus macro virus is loaded into main memory and 9. Avast Anti-Virus destroys the data stored in hard disk. ADVANTAGES OF COMPUTER ANTI-VIRUS 6. Script Virus - is any type of malicious code that (Stokes & Johnston, 2020) is executed after a client visits a page that has 1. Protection from Viruses - The basic aim of an promotions, records or code running out in the Anti-virus is to protect your computer from background that contains the malicious code. viruses. An anti-virus will keep you away from Commonly found script viruses are written using getting infected from computer viruses such as the Visual Basic Scripting edition (VBS) and the trojans, malware and spyware. JavaScript programming languages 2. Protecting Personal Information - Hackers and someone else. For example, using website's viruses go hand in hand. A good anti-virus data/information and publishing a book without program will secure you while you surf the the source to earn benefit. Internet, preventing hackers from accessing your personal things such as credit card information 7) Thou shalt not appropriate other people’s and bank account access. The firewall feature intellectual output. It is a crime, if you copy text included with most anti-virus software will hinder or images from a website and post them on your any unauthorized incoming connections to your own website and definitely it is not ethical. For network or computer, it will prevent from the example, posting new movie that just came out on hackers from digging their hooks into your life YouTube. and your computer. 8) Thou shalt think about the social consequences of Ten Commandments of Computer Ethics (Bynum, the program you are writing or the system you are 2018) designing. Use your IT talents for good purposes. Ethics is a branch of philosophy that deals with For example, a computer game for kids should not defining what is right and wrong. Itemized below are have content that can influence them negatively. 10 commandments to help you appreciate computer Similarly, composing malicious software or ethics. Anybody working in the field of IT is going to making program that can spy on other people's experience a great deal of moral issues. (Bynum, computer is ethically wrong. 2018). 9) Thou shalt use a computer in ways that show 1) Thou shalt not use a computer to harm other consideration and respect. While communicating people. You should not program a computer to do over the Internet, one should treat others with dangerous things to people. For example, to respect by not intruding others' private space and developed a robot to kill individuals, create not using abusive language. One should be viruses, or weapons of mass destruction. courteous while communicating over the web and should respect others' time and resources. For 2) Thou shalt not interfere with other people’s example, chatting with somebody using curse computer work. Everybody has the right to words. utilized computers. As the hippies used to say: “Live and let live!”. For example, deleting friend's Summary essay document and saying I was just playing. This module discussed the following: Occupational Health and Safety Procedure: OHS 3) Thou shalt not use a computer to steal. This one is refers to the legislation, policies, guidelines and clear; stealing is bad with or without a computer. activities that aim to protect the health, safety and For example, taking somebody's personal welfare of all individuals at their work information or idea to use without any consent. environment. People rely on computers to handle the more tedious details of their social, business, 4) Thou shalt not use a computer to bear false and financial lives. witness. This commandment means that you We have also discussed the two aspects of shouldn’t use a computer to create false facts. For computer hardware security such as the security of example, photoshopping a picture to make an the hardware itself and how hardware enables innocent man look guilty or posting something secure software. like "He or she did ...." without any proves. System Maintenance Tips on Taking Care of Your Personal Computers 5) Thou shalt not use or copy software for which you Password protection have not paid. Consider that it is so difficult to Legal Issues develop a good software, consider all the Computer Viruses and Anti- Viruses individuals and costs included. You have two 10 Commandments of Computer Ethics options: 1) purchase a license or 2) find an open source software as an alternative. For example, cracking demo program and using it forever.
6) Thou shalt not use other people’s computer
resources without authorization or proper compensation. It is illegal and not ethical to do bad things on a computer while logged in as