Tuesday 6 March 2018

MY FAMILY VILLAGE











SECURITY MEASURE

SECURITY MEASURE 

DEFINITION:
The precautionary measures taken toward possible danger or damage.

DATA BACKUP:

A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss.

Data loss can be caused by many things ranging from computer viruses, hardware failures, file corruption, system failure or theft. 



CRYPTOGRAPHY


CRYPTOGRAPHY
Technology of encoding information so it can only be read by authorized individuals


ENCRYPTION
Process of converting readable data into unreadable characters to prevent unauthorized access


DECRYPTION
Process to decode encrypted data.



CARYTOGRAPHY

-To read the data, you must decrypt it into readable form.
-The unencrypted data is called plain text.
-The encrypted data is called cipher text.
-To encrypt, plain text converted into cipher text using an encryption key.

IMPORTANCE
-The process of proving one's identity. 
-Ensuring that no one can read the message except the intended receiver. 
-Assuring the receiver that the received message has not been altered in anyway from the original. 
-A mechanism to prove that the sender really sent this message. 



ANTIVIRUS
Anti-virus software is a program or set of programs that are designed to prevent, search for, detect and remove software viruses and other malicious software like worms, Trojan horses, adware and more.

If and when a virus is detected, the computer displays a warning asking what action should be done, often giving the options to remove, ignore, or move the file to the vault.

If a virus infected a computer without an antivirus program, it may delete files, prevent access to files, send spam, spy on you, or perform other malicious actions.

Examples: Norton anti-virus, AVG anti-virus, Kaspersky anti-virus



SOME BASIC FUNCTIONS:
Scan specific files or directories for any malware or known malicious patterns
Allow you to schedule scans to automatically run for you
Allow you to initiate a scan of a specific file or of your computer, or of a CD or flash drive at any time.
Remove any malicious code detected –sometimes you will be notified of an infection and asked if you want to clean the file, other programs will automatically do this behind the scenes.






ANTI-SPYWARE
Spyware is a type of malware that is installed on a computer without the user's knowledge in order to collect information about them. 

Once installed, spyware can degrades system performance by taking up processing power, installing additional software, or redirecting users' browser activity.

It also can monitors user activity on the Internet and transmits that information in the background to someone else.

Spyware can also gather information about email addresses and even passwords and credit card numbers.


Examples:
Spyware Blaster
Spy Sweeper





FIREWALL



A firewall is a system designed to prevent unauthorized access to or from a private network. 

A firewall can be implement either through hardware or software form, or a combination of both. 

Firewalls prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. 

All messages entering or leaving the intranet (i.e., the local network to which you are connected) must pass through the firewall, which examines each message and blocks those that do not meet the specified rules/security criteria.

Rules will decide who can connect to the internet, what kind of connections can be made, which or what kind of files can be transmitted in out.




                   PHYSICAL ACCESS CONTROL

lock your laptop whether you're at home, in a dorm, in an office, or sitting in a coffee shop, use a security device, such as a laptop security cable.

Lock doors and windows, usually adequate to protect the equipment.

Put the access code at the door to enter the computer room or your office.

Put the CCTV (closed-circuit television) in your office or computer room.

Make a policies who can access the computer room or your data center.


       


     HUMAN ASPECTS: AWARENESS


Ethics - Be a good cyber citizen

Do not engage in inappropriate conduct, such as cyber bullying, cyber stalking or rude and offensive behavior. 

Do not use someone else's password or other identifying information. 


Lock it when you leave

It takes only a few seconds to secure your computer and help protect it from unauthorized access. Lock down your computer every time you leave your desk. 

Set up a screen-saver that will lock your computer after a pre-set amount of time and require a password to log back in.


Protect data on mobile devices

Choose a strong password. A good password should always include upper and lowercase letters, numbers, and at least one special character. Never use the same password for multiple devices or accounts. 

Store your portable devices securely. When not in use, store devices out of sight and when possible in a locked drawer or cabinet.









Sunday 4 March 2018

COMPUTER SECURITY RISKS

DEFINITION:
- any event or action that could cause a loss of damage to computer hardware, software, data, information or processing capability

TYPES OF COMPUTER SECURITY RISKS

1. MALICIOUS CODE

-COMPUTER VIRUS
- is code causing damage to a computer or system. It code not easily or solely controlled though the use of anti-virus tools.
DEFINITION: a computer virus is a potentially damaging computer program that effects of infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.

EXAMPLE: Melissa, Tequila, Cascade, Invader


-WORM
-copy itself repeatedly
*memory or on a network, using up resources and possibly shutting down the computer or the network
*spread from the computer to computer, but unlike a virus, it has the capability to travel without any human action
*it will causing web server, network servers and individual computers to stop responding

EXAMPLE: Jurusalem, Sobing, Nimda, Morris worm




TROJAN HORSE


-A program that hides within or looks like a legitimate program. it does not replicate itself to other computer.

-appear to be useful software but will actually do damage once installed or run on your computer.
EXAMPLES: Netbus, Back Orifice, Subseven.




UNAUTHORIZED ACCESS AND USE







UNAUTHORIZED ACCESS

-the use of computer or network without permission





UNAUTHORIZED USE

-the use of a computer or its data for unapproved or possibly illegal activities.




UNAUTHORIZED ACCESS AND USE

HARDWARE THEFT

-is the act of stealing computer equipment
-hardware vandalism is the act of defending or destroying computer equipment
-safeguard against Hardware Theft and vandalism:
1.physical access controls, such as locked doors and windows.
2. install alarm system in their building


2.SOFTWARE THEFT
-illegally copies a program occurs when software is stolen from software manufactures.
-illegally registers and/or activities a program involves users illegally obtaining registration numbers and/or activation codes




INFORMATION THEFT
- occur when someone steals personal or confidential information
-the loss of information can cause damage of hardware and software
-may steal credit card numbers to make fraudulent purchases. 

SAFEGUARD AGAINST INFORMATION THEFT:
1. protecting information on computer located on an organization's premises.
2.to protect information on the internet and networks, organizations and individuals use a variety of encryption techniques.



SYSTEM FAILURE

A system failure is the prolonged malfunction of a computer

Can cause loss of hardware, software, data, or information.



These include aging hardware; natural disasters such as fires, floods, or hurricanes; random events such as electrical power  problems; and even errors in computer programs.



Safeguards against System failure

To protect against electrical power variations, use a surge protector. 

A surge protector, also called a surge suppressor, uses special electrical components to smooth out minor noise, provide a stable current flow, and keep an overvoltage from reaching the computer and other electronic equipment.












AREAS OF COMPUTING ETHICS

INFORMATION ACCURACY 

-do not assume all the information on the web is correct
-users should evaluate the value of a web page before relying on its content 


GREEN COMPUTING 
- average computer users can employ the following general tactics to make their computing usage more green 

-turn off computes at the end of each day
-
- refill printer cartridges, rather than buying news one
               




CODES OF CONDUCT
- written guideline that helps determine whether a specific action is ethical?unethical or allowed/not allowed



INFORMATION PRIVACY

-store their data online
-collect and use this information without your authorization


INTELLECTUAL PROPERTY-IP
-PATENT: a set of exclusive rights granted by the government to an inventor or applicant for a limited amount of time

-TRADEMARK: from competitors stealing your identity or using a name or symbol so similar that it could cause confusion for your clients or customers.

-COPYRIGHT: authors of "original works" and includes such things as literary, dramatic, musical.




RULES OF NETIQUETTE


RULES OF COMPUTER NETIQUETTE

 1.Be polite. Avoid offensive language

2.Avoid sending or posting flames, which are abusive or insulting messages. Do not participate in flame wars, which are exchanges of flames.


3.Be careful when using sarcasm and humor, as it might be misinterpreted

4.Do not use all capital letter, which is the equivalent of SHOUTING!

5.Use emoticons to express emotion. 
:) smile       :( frown

6.Use abbreviations and acronyms for phrases:
BTW: by the way        FYI: for your information       IMHO: in my humble opinion    


7.Clearly identify a spoiler, which is a message that reveals an outcome to a game or ending to a movie or program


8.Be forgiving of other mistakes


9.Read the FAQ (frequently asked questions), if one exists  

MY FAMILY

I LOVE THEM SOOOOO MUCHHHHHH