Professional Practices Final
Professional Practices Final
End of Control: Large organizations no longer control information; individuals can publish
content freely.
Fewer Gatekeepers: Information is directly shared among users, reducing reliance on
traditional media.
Fragmentation: Instead of centralized news sources, people get updates from various
platforms (blogs, social networks, YouTube).
Interactive Communication: Unlike traditional media (TV, newspapers), social media allows
real time discussions and audience participation.
Building Personal & Professional Brands: Helps users establish their expertise and connect
with industry professionals.
Marketing & Networking: Businesses promote their services, engage with customers, and
expand their reach.
Job Search & Talent Acquisition: Platforms like LinkedIn help professionals find job
opportunities and employers identify potential candidates.
Privacy Issues: Users often overlook privacy settings, exposing their personal data to cyber
threats.
Cybersecurity Threats: Social media platforms can be targeted by hackers using malware,
phishing attacks, or fake profiles.
Misinformation & Fake News: False information spreads quickly, influencing public opinion
and sometimes causing harm
.
Conclusion
Both Information Security and Social Media are critical aspects of the digital age.
Understanding InfoSec helps protect data, while responsible social media use ensures
privacy, security, and effective networking.
Week 10
Lecture 1: Software Risk
1. Definition
Software risk refers to the uncertainty in software development that may lead to project
failure, financial loss, or security threats.
2. Types of Risks
Project Risks: Affect schedule and cost.
Technical Risks: Affect software quality.
Business Risks: Threaten the software’s market viability.
3. Risk Categorization
Known Risks: Identifiable in advance.
Predictable Risks: Based on past experiences.
Unpredictable Risks: Unexpected and difficult to foresee.
4. Risk Management Process
Risk Identification: Assess potential risks to software and business.
Risk Control: Implement measures to mitigate threats.
Risk Prioritization: Focus on high impact risks.
Key Points
Risk Management – Process of identifying, analyzing, and mitigating security threats.
Risk Identification – Identifies assets, threats, and vulnerabilities.
Risk Assessment – Evaluates risks based on likelihood, impact, and existing controls.
Documenting Risk Assessment – Records vulnerabilities, threats, and controls for decision
making.
Conclusion
Risk management protects an organization’s information by identifying vulnerabilities,
assessing risks, and implementing controls. A structured approach minimizes threats and
ensures data security, safeguarding assets from potential cyber threats and operational
risks.
WEEK 11 health and safety at work
LECTURE 1
Introduction
Health and Safety at Work ensures employees' well being, preventing workplace accidents
and promoting productivity. Occupational Health and Safety (OHS) laws protect workers'
rights by enforcing regulations for safe working conditions, reducing risks, and improving
overall workplace efficiency.
Key Points
The Problem
Workplace safety gets attention only after major disasters.
Despite a decline in fatal accidents, many workers still suffer injuries or death.
Background
Industrial Revolution led to rapid production and poor working conditions.
Occupational Health and Safety (OHS) emerged to protect employees from hazards.
Benefits of Workplace Safety
Fewer accidents and injuries.
Increased productivity and efficiency.
Motivated and focused workforce.
Economic growth through a healthy workforce.
Occupational Health and Safety (OHS) in Pakistan
No single comprehensive law; multiple regulations govern OHS.
Key laws include Factories Act 1934, Mines Act 1923, and Dock Laborers Act 1934.
Provincial rules (Punjab, Sindh, KPK) supplement national laws.
Employer and Government Role
Employers ensure safe work environments and provide training.
Government appoints inspectors to enforce laws.
Discussion and Summary
Health and safety regulations protect workers from hazards, ensuring a safe workplace. In
Pakistan, various laws govern OHS, with employers and the government playing crucial
roles. Proper implementation and training enhance workplace safety, productivity, and
employee well being.
2. Prevention Methods
Regular software updates.
Using firewalls and antivirus software.
Strong, unique passwords.
Avoiding suspicious emails and websites.
Secure online shopping practices.
3. Legal Framework
Computer Misuse Act 1990 (UK)
Criminalizes unauthorized access.
Punishments include fines and imprisonment.
Conclusion
Computer misuse is a growing global concern, requiring strong legal frameworks,
cybersecurity measures, and awareness to prevent cyber threats. Staying vigilant and
following security best practices is crucial in minimizing risks.
WEEK 12
LECTURE 1 : HACKING
Introduction
Hacking is the act of gaining unauthorized access to computer systems or modifying their
features. It can be ethical (security testing) or unethical (data theft, malware attacks).
Hackers exploit system vulnerabilities, using various techniques to achieve their goals.
Key Points
1. Types of Hacking
Website Hacking – Gaining control over websites.
Network Hacking – Exploiting network vulnerabilities.
Password Hacking – Cracking login credentials.
Software Hacking – Modifying software functionalities.
Email Hacking – Unauthorized access to email accounts.
Computer Hacking – Altering or stealing files.
Ethical Hacking – Finding and fixing security flaws.
2. Prevention Measures
Strong passwords and two factor authentication.
Regular software updates and firewalls.
Secure networks and cautious email handling.
Conclusion
Hacking poses significant security risks but also serves ethical purposes in improving
cybersecurity. Awareness, preventive measures, and ethical hacking are essential in
mitigating cyber threats.
LECTURE 2
Introduction to Cyber Laws
Cyber laws regulate legal aspects of digital activities, including online fraud, privacy, and
intellectual property. They address cybercrimes such as hacking, identity theft, and cyber
terrorism, ensuring security in cyberspace.
Key Points
1. Definition
2. Cyber Crimes
Cyber Crime Bill 2007: Covers cyber terrorism, fraud, forgery, spamming, stalking, and data
damage.
5. Punishments
Cyber laws protect digital users by addressing crimes and ensuring legal recognition of
electronic transactions, fostering secure online environments.
WEEK 13
A cybercrime legal framework provides law enforcement with tools to prevent, investigate,
and prosecute cybercrimes while balancing privacy and security. It regulates electronic
surveillance, data collection, and digital evidence to ensure justice and protect digital rights.
Key Points
3. Intercepting Communications
4. Data Collection
Conclusion
Key Points
Conclusion
Effective finance and accounting practices are crucial for the success of
software engineers and their ventures, ensuring sustainable growth and
compliance with regulations.
THANKS US ON EASYPAISA 😊