1.2 Computer Ethics and Legal Issues
126.96.36.199 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.
188.8.131.52 Differentiate between ethics and law.
Computer ethics is a system of moral standards or values used as a guideline for computer users.
184.108.40.206 State the need for intellectual property laws.
Why do we need computer ethics?
- the growth of the WWW has created several novel legal issues
- the existence of new questions that older laws cannot answer
- traditional laws are outdated/anachronistic in this world
- a more coherent body of law is needed to govern Internet and computers
1.3.2 Security Threats
220.127.116.11 Explain briefly the different threats to computer security:
• Malicious code
• Natural disaster
1.3.3 Security Measures
18.104.22.168 Select the appropriate security measures to overcome the identified computer threats
1. Data backup is a program of file duplication.
2. Security measures mean the precautionary measures taken to ward off possible danger or damage.
3. Cryptography is a process of hiding information by altering the actual information into different representation.
4. An Antivirus program protects a computer against viruses.
5. Spyware is a program placed in a computer without the user’s knowledge and secretly collects information from the user.
6. Firewall prevents some communications forbidden by a security policy.
7. Human aspects refer to the user and also the intruder of a computer system which is one of the hardest aspects to give protection to.
different way of explaining.
1. Data backup- Saving of your data in two or more locations, so that if something happens to your computer you still have your data preserved in the backup.
2. Cryptography- The conversion of data into a scrambled code that can be deciphered and sent across a public or private network. Other people can’t understand the content of cryptography mail.
3. Antivirus- Is a software used to prevent, detect and remove malware, including computer viruses, worms and Trojan horses. Such programs may also prevent and remove adware, spyware and other forms of malware. (eg: AVG, Norton, McAfee)
4. Spyware- is a type of malware that is installed in computers and collects little bits of information at a time without the users’ knowledge. Anti-spyware is to remove spyware or any other type of malware.
5. Firewall- is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. (eg: Other people will be unable to enter another person’s computer through a network or any other connection)
6. Human aspects- Where human factors affect the computer. (eg: stealing information or using another person’s computer without the owner’s permission)
22.214.171.124 Apply the correct security procedures.
• Data backup
• Human aspects