0% found this document useful (0 votes)
15 views23 pages

Lesson 7 8 GE ELEC 3 1

Uploaded by

james04tagoon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views23 pages

Lesson 7 8 GE ELEC 3 1

Uploaded by

james04tagoon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 23

LESSON

CYBERSECURITY
Computer Security, Safety and Data Privacy
A computer security risk is any event or action
that could cause a loss of or damage to
computer hardware, software, data, information,
or processing capability. Any illegal act involving
a computer is a computer crime; the term
cybercrime refers to online or Internet-based
illegal acts.
A computer virus is a potentially damaging program that affects, or
infects, a computer negatively by altering the way the computer works
without the user’s knowledge or permission.

Example of virus:

A worm is a program that copies itself repeatedly, using up resources


and possibly shutting down the computer or network.
A Trojan horse is a program that hides within or looks like a legitimate
program​.

A rootkit is a program that hides in a computer and allows someone


from a remote location to take full control of the computer.
• Unauthorized access is the use of a computer or network without permission.

• Unauthorized use is the use of a computer or its data for unapproved or illegal

activities. Organizations can take measures such as implementing a written

acceptable use policy (AUP), a firewall, intrusion detection software, an access

control, and an audit trail.

• Access controls include a username and password or passphrase, a CAPTCHA, a

possessed object, and a biometric device.


Software Manufacturers Protect against Software Piracy

Software piracy is the unauthorized and illegal duplication of copyrighted


software. To protect themselves from software piracy, manufacturers issue a license
agreement and require product activation.
Encryption and Its Necessity

Encryption prevents information theft and unauthorized access by converting


readable data into unreadable characters. To read the data, a recipient must
decrypt, or decipher, it into a readable form. An encryption algorithm, or cypher,
converts readable plaintext into unreadable ciphertext. Encryption is used to
protect information on the Internet and networks.
Computer ethics govern the use of computers and
information systems. Issues in computer ethics include
the responsibility for information accuracy and the
intellectual property rights to which creators are entitled
for their works.

An IT (information technology) code of conduct helps


determine whether a specific computer action is ethical
or unethical. Green computing reduces the electricity
and environmental waste while using a computer.
Issues Surrounding Information Privacy

• Information privacy is the right of individuals and companies to deny or restrict


the collection and use of information about them. Issues surrounding information
privacy include the following.

• A cookie is a file that a Web server stores on a computer to collect data about the
user. Spyware is a program placed on a computer that secretly collects information
about the user. Adware is a program that displays an online advertisement in a
banner or pop-up window.

• Spam is an unsolicited e-mail message or newsgroup posting sent to many


recipients or newsgroups at once.
• Phishing is a scam in which a perpetrator attempts to obtain personal or
financial information. The concern about privacy has led to the enactment of
many federal and state laws regarding the disclosure of data.

• Social engineering is defined as gaining unauthorized access or obtaining


confidential information by taking advantage of the trusting human nature of
some victims and the naivety of others.

• Employee monitoring uses computers to observe, record, and review an


employee’s computer use.

• Content filtering restricts access to certain materials on the Web.


Options for Backing Up Computer Resources
A backup is a duplicate of a fi le, program, or disk that can be used to
restore the file if the original is lost, damaged, or destroyed. Others use
RAID or continuous backup. Most operating systems and backup
devices include a backup program.
R.A. No. 10175: The Cybercrime Prevention Act

The Cybercrime Prevention Act of 2012 also penalizes offenses


against the privacy, confidentiality, integrity, and availability of
computer data and systems, such as illegal access, unauthorized
interference, system interference, data interference, misuse of
devices, and cybersquatting.

Also, the Cybercrime Prevention Act of 2012 covers any digital fraud,
computer-related forgery, and identity theft.
LESSON 8:

The Present and the


Future trends in
Information
Technology
Cryptocurrencies are a digital cash designed to be
quicker, cheaper and more reliable than our regular
government issued money.
What is bitcoin?
Bitcoin is the first digital cash created in 2009. It was made by an
unknown person or group who went by the name, Satoshi Nakamoto.
Bitcoin is unique because it does not rely on government/bank created
money.
What is blockchain?
Blockchain is technology for creating permanent,
secure digital recordings that don’t rely on any
single person or group. Blockchains can record any
information, though the first example was created
to record bitcoin transactions.
Imagine the blockchain as a book of records. Each
page in that book, is a block, and can record
anything. Blocks are created one after the other,
chained to each other creating what we know as
the blockchain.
Multiple blockchain records are maintained
simultaneously by many of unrelated individuals
and their computers, making it cloud storage on
steroids. Updates are seen immediately and
manipulation is extremely difficult/impossible. This
positive quality known of many people keeping
their own copies of the blockchain is known as
“distributed”.
•What is mining?
•Mining is the computer process
of recording and verifying
information on the digital record
known as the blockchain.
Because mining requires
computer power, people do this
work in return for money. Each
computer that fulfills this process
can earn a reward in digital
money and sometimes brand
new, virgin coins.
•To keep the blockchain network
running smoothly, only one block
can be created at a time. There
are several different ways to do
CLOUD COMPUTING

You might also like