Lecture 7 - computer security
Lecture 7 - computer security
Keeping data away from those who should not have it and
making sure that those who should have it can get it are fairly
basic ways to maintain the integrity of the data.
• Denial of Services
• Theft of Services
• Theft of Resources
Sources of Security Breach
1. Employees
Criminal hackers who break into the systems also have good
technical skills but have chosen to apply them in undesirable (often
illegal) ways.
Encrypt data
Just as a brick wall can create a physical barrier, a firewall creates a barrier between
the Internet and your computer
RELIABILITY
• As companies become dependent on I.T, they also become
dependent on the continued availability of their computers and
communications systems.
Indeed, according
to research studies
, an hour spent
using the internet
reduces face-to-
face contact with
friends,
coworkers and
family.
QUALITY OF LIFE ISSUES CONT’D
• Gambling
• Gambling is already widely spread in the developed countries but
information technology makes it almost unavoidable.
• Some gamblers win big and others don’t but either way, this is their
chosen form of entertainment and for some, an addiction could
develop.. Despite efforts to curb gambling on the web, bettors in US
generated an estimated 70% of global online gambling revenues.
QUALITY OF LIFE ISSUES CONT’D
Information Technology misuse can result in;
Explosion of pornography
Online pornographers use pop-up ads and internet search
engines to troll for new customers
This means that children may be exposed to porn when
involved in innocent online searches
Parents may use online blocking software like Cybersitter,
Cyber Patrol, or Net Nanny to prevent this
QUALITY OF LIFE ISSUES CONT’D
Information Technology misuse can result in;
Environmental problems
Manufacturing computers and circuits can cause pollution
Computer component manufacturing employees may be exposed to
toxic substances
Used computers/monitors contain chromium, cadmium, lead,
mercury, PVC, and brominated flame retardants –all toxic
substances that must be disposed of properly..
QUALITY OF LIFE ISSUES CONT’D
Technology may affect the gap between the rich and the poor
Most jobs require employees who are tech-savvy
People who are not tech-savvy won’t qualify for those jobs
Technology is being used to replace employees in traditional
jobs, traditionally filled by untrained workers
Among the urgent issues that businesses must confront today are
the following;
E-mail Privacy
Software Licenses
Software Copyrights
Hardware Access
Intellectual Property Ownership
File Access
Data Ownership
Reality check
Both users and developers of information technology tend to focus
primarily on I.T’s capabilities for assisting them in a particular
business situation.
They are also caught up in the power of I.T that their first inclination is
to ask “Can I.T help solve a problem?” or “can I.T do this.” And if the
capabilities are affirmed, their position is implicitly, “if the system can
do it and payoff is right, then lets do it.”