CHAPTER 5 - DIGITAL SAFETY AND SECURITY



CHAPTER 5 - DIGITAL SAFETY AND SECURITY

➤Digital security risk is any event or action that could cause a loss of or damage to a computer or mobile device hardware, dsoftware, ata, information, or processing capability.


Differences between Hacker and Cracker:

Hacker
  1. Corporate Spies
  2. Break the computer system with ethics
    to test the weakness of the system
  3. Do not damage the system or destroy data
Cracker
  • Unethical employee
  • Deliberately breaks the system to bring damage and sabotage elements
  • Unethical
  • Aggressive and dangerous


🔹Internet and Network Attacks




  • A firewall is hardware and/or software that protects a network’s resources from intrusion
    (between computer & internet)

🔹Unauthorized Access and Use


Unauthorized Access
Unauthorized Use
The use of a computer or network without permission
The use of a computer or its data for unapproved or illegal activities
  • Organization take several measures to help prevent unauthorized access and use:
Acceptable use policy
- Disable file and printer sharing

  • Access controls define who can access a computer, device, or network
  • The computer, device, or network should maintain an audit trail  that records in a file both successful and unsuccessful access attempts
- User name
- Password
- Passphrase
- Combination (word + number)
CAPTCHA (Example: I’m not a robot)
  • A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
↳ Fingerprint reader
↳ Face recognition system
↳ Hand geometry system
↳ Voice verification system
↳ Signature verification system
↳ Iris recognition system
  • Digital forensics is the discovery, collection, and analysis of evidence found on computers and networks
  • Areas that use digital forensic:
⇨ Law Enforcement
⇨ Criminal Prosecutors
⇨ Military Intelligence
⇨ Insurance Agencies
⇨ Information security department

🔹Software Theft
Software theft occurs when someone:
- Steals software media
- Intentionally erases programs
Illegally registers and/or activates a program
- Illegally copies a program

🔹Information Theft
Information theft occurs when someone steals personal or confidential information
Encryption is a process of converting data that is readable by humans into encoded characters to prevent unauthorized access
-Example: WhatsApps


A website that uses encryption techniques to secure its data is known as a secure site (have https://)

🔹 Hardware Theft , Vandalism, and Failure
Hardware theft is the act of stealing digital equipment
Hardware vandalism is the act of defacing or destroying digital equipment
To help reduce the of chances of theft, companies and schools use a variety of security measures:



🔹 Backing up - The Ultimate Safeguard
A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed (make a copy of it)
Off-site backups are stored in a location separate from the computer or mobile device site
-Example: Cloud Storage



🔹 Ethics and Societ
  • Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems
  • Not all information in the web is correct
  • Intellectual property rights are the rights to which creators are entitled to their work
  • A copyright protects any tangible form of expression
  • A code of conduct is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed 
  • Green computing involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies
  • Content filtering is the process of restricting access to certain material on the Web (web filter)
  • Web filtering software restricts access to specified websites
🔹Information Privacy
- Information privacy refers to the right of individuals and companies to deny or restrict the collection and use of information about them
It is important to safeguard your information
Information about you can be stored in a database when you:
Fill out a printed or online form
Create a social networking profile
Register a product warranty

Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information

- Spyware is a program placed on a computer or mobile device without the user’s knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online

Adware is a program that displays an online advertisement in a banner or pop-up window on webpages, email messages, or other Internet services

Employee monitoring involves the use of computers, mobile devices, or cameras to observe, record, and review an employee’s use of a technology, including communications such as email messages, keyboard activity (used to measure productivity), and websites visited

- Many programs exist that easily allow employers to monitor employees. Further, it is legal for employers to use these programs

CHAPTER 4 - PROGRAMS AND APPLICATIONS


Chapter 4: Programs and Applications

  1. Differences between Programs, Softwares, and Applications

PROGRAM
A set of instructions telling a computer what to do

SOFTWARE
  • The programs and other operating information used by a computer
  • Software can be made up of more than one program. All-encompassing term that is often used in contrast to hardware

APPLICATION
  • A program or group of programs that is designed for the end user
  • Application software cannot run on itself but is dependent on system software to execute

#All applications are programs, but a program is not necessarily an application

  1. Operating system is a set of programs that coordinates all the activities among computer or mobile device hardware.
Example:
  • Windows
  • Linux
  • Redhat
  • Mac OS


Task of the operating system:

  • Recognises and install peripheral devices
  • Manages files and folders
  • Shares out system memory
  • Handles system errors and alerts user
  • Manages system security
  • Allows softwares to communicates with hardware
  • Moves data to and from the hard disk
  • Loads and runs other software applications
  • Handles input and output
3. Productivity Applications

Word processing software allows users to create and manipulate documents








Clip art is a collection of drawings, photos, and other images


Presentation software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group


Spreadsheet software allows users to organize data in rows and columns and perform calculations

A database is a collection of data organized in a manner that allows access, retrieval, and use of that data




Spreadsheet vs Database

SPREADSHEET
  1. Tabulate data and create graphs based on the data
  2. Hold a less amount of data
  3. Too much data is simply impractical in a single spreadsheet as it becomes more difficult for a person to edit it
  4. Usually used for presentations and paperworks
DATABASE
  1. Stored data so that can be retrieved by users
  2. Hold a large amount of data
  3. Not edited directly by people as there are other applications that are meant to enter new data or modify the contents
  4. Commonly used in cases where a lot of data needs to stored and tracked

Note taking software is an application that enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page.
  • Microsoft OneNote
  • Google keep
            

Calendar and contact management software is an application that helps you organize your calendar, keep track of contacts, and share this information with other devices or users



A software suite is a collection of individual programs available together as a unit
Project management software is an application that allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.
  • Microsoft Project
  • JIRA
  • Trello


Accounting software is an application that helps businesses of all sizes record and report their financial transactions.
  • Quickbooks
  • GnuCash


Personal finance software is a simplified accounting application that helps home users and small/home office users balance their checkbooks, pay bills, track personal income and expenses, verify account balances, transfer funds, track investments, and evaluate financial plans.
  • Quicken
  • Microsoft money
  • Moneydance


Legal software is an application that assists in the preparation of legal documents and provides legal information to individuals, families, and small businesses.


Users able to create contracts and legal forms, plan an estate, and negotiate other types of life changes that require legally binding documents.
  • MyAttorney
  • Home & Business Attorney
  • Perfect Attorney



Tax preparation software is an application that can guide individuals, families, or small businesses through the process of filing federal taxes




4. Graphics and Media Software


  1. Communication Applications

  1. Security Tools
  1. File and Disk Management Tools

CHAPTER 3 - COMPUTERS AND MOBILE DEVICES



CHAPTER 3 - COMPUTERS AND MOBILE DEVICES


  • A supercomputer is the fastest, most powerful computer — and the most expensive
Differences between Server and Supercomputer

Server vs Supercomputer
SERVER
SUPERCOMPUTER
Serves bits and bytes of data that enter and leave the server
Regular hardware combined in enormous proportions
Web servers-processing requests from surfers and sending them back data
Contain so many processors
Web browsers - assemble that data to generate Web pages
Predict the weather, build airplanes, model the brain and simulate the way the planet works
Server send files in a network
Sequoia Blue Gene/Q supercomputer processing 504 billion events per second(2013)
≈1 million desktop computers

🌥 Cloud Computing 🌥
Refers to an environment of servers that house and provide access to resources users access through the Internet

🔌Ports and Connections
🔹 Port ⇢ point at which a peripheral device attaches to or communicates with a computer or mobile device so that the peripheral device can send data to or receive information from the computer or mobile device

🔹 Connector ⇢ joins a cable to a port


🔹 Wireless Communication Technologies ⇢ Bluetooth, Wi-Fi, NFC

➹ Protecting Hardware
  • Surge Protector

  • Uninterruptible power supply (UPS






😷 Health Concerns of Using Technology

 A repetitive strain injury (RSI) is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints
Computer vision syndrome (CVS) is a technology-related health condition that affects eyesight
Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
Technology addiction occurs when the technology consumes someone’s entire social life



CHAPTER 2 - THE INTERNET


Chapter 2 - The Internet

Internet is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals

Evolution of the internet



Connecting to the internet

Connecting to the internet
Wired
Wireless
Cable Internet service
Wi-Fi (wireless fidelity)
DSL (digital subscriber line)
Mobile broadband
Fiber to the Premises (FTTP)
Fixed wireless

Satellite Internet Service
  • Cybercafé ➤ a location that provides computers with Internet access, usually for a fee
  • Hot spot ➤ a wireless network that provides Internet connections to mobile computers and devices
  • Internet service provider (ISP➤ a business that provides individuals and organizations access to the Internet free or for a fee (Unifi,TM,Celcom)
  • IP address ➤ sequence of numbers that uniquely identifies each computer or device connected to the Internet
  • Domain name ➤ text-based name that corresponds to the IP address
  • DNS server translates the domain name into its associated IP address 




The World Wide Web

The World Wide Web (www) consist of webpages which has a unique address called a web address or URL

Website is a collection of related webpages and associated items

Types of websites:
- Online social network
- Informational
Media sharing and bookmarking sites
News, weather, sports, and other mass media
Educational
Business, Governmental, and Organizational
- Blogs
- Wikis
Health and Science
Entertainment
Financial
Travel and Mapping
Shopping and Auctions
Careers and Employment
E-Commerce
Portals

Web server is a computer that delivers requested webpages to your computer

⛧ Browser is an application that enables users with an Internet connection to access and view webpages on a computer or mobile device

⛧ home page is the first page that a website displays

Web app hosts usually provide storage for users’ data and information on their servers, known as cloud storage

Web publishing is the development and maintenance of websites




Media on web

*A plug-in is a program that extends the capability of a Web browser





Other Internet Services
⚛ Email program allows you to create, send, receive, forward, store, print, and delete email messages

⚛ An email list is a group of email addresses used for mass distribution of a message

⚛ Instant messaging (IM) is a real-time Internet communications service

⚛ A chat is a real-time typed conversation that takes place on a computer or mobile device

⚛ A chat room is a website or application that permits users to chat with others who are online at the same time

⚛ A discussion forum is an online area in which users have written discussions about a particular subject

⚛ VoIP (Voice over IP) enables users to speak to other users over the Internet 
Example: viber, whatsapp, skype

⚛ FTP (File Transfer Protocol) is an Internet standard that permits file uploading and downloading to and from other computers on the Internet
- FTP Server: a computer that allows users to upload and/or download files using FTP


Netiquette
The code of acceptable Internet behavior



Shy Female Monkey Flower Hairpin