Articles

In ict for spm computer ethics and legal issues security measures on March 7, 2010 by ailyn24voices

1.2 Computer Ethics and Legal Issues

1.2.1 Definition

1.2.1.1 Define Computer Ethics, Code of Ethics, Intellectual Property, Privacy, Computer Crime and Cyber Law.

1.2.1.2 Differentiate between ethics and law.

Ethics.


Computer ethics is a system of moral standards or values used as a guideline for computer users.

Law.
Legal system comprising of rules and principles that govern the affairs of a community and is controlled by a political authority.

1.2.1.3 State the need for intellectual property laws.

http://library.thinkquest.org/26658/cgi-bin/1-1.cgi


Why do we need computer ethics?

  • the growth of the WWW has created several novel legal issues 
  • the existence of new questions that older laws cannot answer 
  • traditional laws are outdated/anachronistic in this world 
  • a more coherent body of law is needed to govern Internet and computers

1.3 Computer Security

1.3.2 Security Threats

1.3.2.1 Explain briefly the different threats to computer security:
• Malicious code
• Hacking
• Natural disaster
• Theft

1.3.3 Security Measures

1.3.3.1 Select the appropriate security measures to overcome the identified computer threats

http://www.docstoc.com/docs/23552426/Lesson-18

1. Data backup is a program of file duplication.
2. Security measures mean the precautionary measures taken to ward off possible danger or damage.
3. Cryptography is a process of hiding information by altering the actual information into different representation.
4. An Antivirus program protects a computer against viruses.
5. Spyware is a program placed in a computer without the user’s knowledge and secretly collects information from the user.
6. Firewall prevents some communications forbidden by a security policy.
7. Human aspects refer to the user and also the intruder of a computer system which is one of the hardest aspects to give protection to.

different way of explaining.

http://www.scribd.com/doc/26695904/Security-Measures
1. Data backup- Saving of your data in two or more locations, so that if something happens to your computer you still have your data preserved in the backup.

2. Cryptography- The conversion of data into a scrambled code that can be deciphered and sent across a public or private network. Other people can’t understand the content of cryptography mail.

3. Antivirus- Is a software used to prevent, detect and remove malware, including computer viruses, worms and Trojan horses. Such programs may also prevent and remove adware, spyware and other forms of malware. (eg: AVG, Norton, McAfee)

4. Spyware- is a type of malware that is installed in computers and collects little bits of information at a time without the users’ knowledge. Anti-spyware is to remove spyware or any other type of malware.

5. Firewall- is a part of a computer system or network that is designed to block unauthorized access while permitting authorized communications. (eg: Other people will be unable to enter another person’s computer through a network or any other connection)

6. Human aspects- Where human factors affect the computer. (eg: stealing information or using another person’s computer without the owner’s permission)

1.3.3.2 Apply the correct security procedures.
• Antivirus
• Anti-Spyware
• Cryptography
• Firewall
• Data backup
• Human aspects

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: