Chapter 5

Digital Safety and Security


DIGITAL RISK SECURITY



Digital Risk Security is any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability. Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime. A cybercrime is an online or Internet-based illegal act.


Differences between hacker and cracker :


INTERNET & NETWORK ATTACKS

Malware, short for malicious software, consists of programs that act without a 
user’s knowledge and deliberately alter the operations of computers and mobile devices.

Firewall is hardware and/or software that protects a network’s resources from intrusion.


UNAUTHORIZED ACCESS AND USE

- Access controls define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it.

- The computer, device, or network should maintain an audit trail  that records in a file both successful and unsuccessful access attempts.

How to protect your device?
a) Possessed Object - is any item that you must carry to gain access to a computer or computer facility. Often are used in combination with a PIN (personal identification number).

b) Biometric Device - Authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer.

Digital forensics - is the discovery, collection, and analysis of 
evidence found on computers and networks.


SOFTWARE THEFT
- Many manufacturers incorporate an activation process into their programs to ensure the software is not installed on more computers than legally licensed.
- During the product activation, which is conducted either online or by phone, users provide the software product’s identification number to associate the software with the computer or mobile device on which the software is installed.
- Software theft occurs when someone:

INFORMATION THEFT

- Information theft occurs when someone steals personal or confidential information.
- Encryption is a process of converting data that is readable by humans into encoded characters to prevent unauthorized access. 
- A digital signature is an encrypted code that a person, website, or organization attaches to an electronic message to verify the identity of the sender. 
- Often used to ensure that an impostor is not participating in an Internet transaction.
- A digital certificate is a notice that guarantees a user or a website is legitimate.
- A website that uses encryption techniques to secure its data is known as a secure site.

HARDWARE THEFT, VANDALISM AND FAILURE

To help reduce the of chances of theft, companies and schools use a variety of security measures.

BACKING UP
- A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed.
- To back up a file means to make a copy of it. Off-site backups are stored in a location separate from the computer or mobile device site.

ETHICS AND SOCIETY


INFORMATION PRIVACY
- Information privacy refers to the right of individuals and companies to deny or
 restrict the collection and use of information about them.
- Huge databases store data online.
- It is important to safeguard your information.




Click here for --> Blog Tutorial


Thank You for dropping by my blog and May Allah SWT bless you ! :D

No comments:

Post a Comment

 
FREE BLOG TEMPLATE BY DESIGNER BLOGS