Welcome To .....

Welcome To .....

Thursday, 17 March 2016

Awareness to Computer Security


Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually.

Topics covered in security awareness training include:
  • The nature of sensitive material and physical assets they may come in contact with, such as trade secrets, privacy concerns and government classified information
  • Employee and contractor responsibilities in handling sensitive information, including review of employee nondisclosure agreements
  • Requirements for proper handling of sensitive material in physical form, including marking, transmission, storage and destruction
  • Proper methods for protecting sensitive information on computer systems, including password policy and use of two-factor authentication
  • Other computer security concerns, including malware, phishing, social engineering, etc.
  • Workplace security, including building access, wearing of security badges, reporting of incidents, forbidden articles, etc.
  • Consequences of failure to properly protect information, including potential loss of employment, economic consequences to the firm, damage to individuals whose private records are divulged, and possible civil and criminal penalties
Being security aware means you understand that there is the potential for some people to deliberately or accidentally steal, damage, or misuse the data that is stored within a company's computer systems and throughout its organization. Therefore, it would be prudent to support the assets of the institution (information, physical, and personal) by trying to stop that from happening.
According to the European Network and Information Security Agency, 'Awareness of the risks and available safeguards is the first line of defence for the security of information systems and networks.'
'The focus of Security Awareness consultancy should be to achieve a long term shift in the attitude of employees towards security, whilst promoting a cultural and behavioural change within an organisation. Security policies should be viewed as key enablers for the organisation, not as a series of rules restricting the efficient working of your business.'

Wednesday, 16 March 2016

Rules of Netiquette


Hello! So... There you go. Rules of netiquette :



In fact, there many other rules, so-called Golden Rule Of Netiquette. The Golden Rule of Netiquette is the spiritual, moral, and ethical foundation of the philosophy.

It is the universal rule of community designed to promote goodwill. Practically applied, it is to be nice. The guideline is not literal. There are things on the Internet that you cannot do to others, even if they have been done to you.



This convention allows users to be themselves in the application of netiquette rules. A user can alter, disregard, or apply any convention to varying degrees by following this principle first. Do the right thing.
Simply put, the Netiquette philosophy is to be nice, Golden Rule. Communicate effectively with electronic devices, core rules. 

Saturday, 12 March 2016

Computer Security Risks

Computer Security Risks : any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Computers can be exposed to the following type of risks :

1. Malicious Code


        Malicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools. Malicious code can either activate itself or be like a virus requiring user to perform an action, such as clicking on something or opening an email attachment.

  • Computer Virus
        A potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. It can spread throughout and may damage files and system software, including the operating system.

  



  •  Worms

           Malicious-logic program that copies itself repeatedly. It using up system resources and possibly shutting down the system. For example; Jerusalem and Sobig.


  • Trojan Horse

       A program that hides within or looks like a legitimate program. It does not replicate itself to other computers. It can spread throughout and may damage files and system software, including the operating system. Examples; Netbus and Beast.

2. Hardware Theft


     The act of stealing computer equipment.

3. Software Theft

     Steals software media

4. Information Theft

     Occurs when someone steals personal or confidential information.

5. System Failure

        Is the prolonged malfunction of a computer.  System failure also can cause loss of hardware, software, data, or information.

Wednesday, 9 March 2016

Importance Of Computer Ethics


Why is it Important to Follow Computer Ethics?


What are ethics? Well, ethics are the moral values that stop you from doing anything that is not legal and that does not harm or damage anyone else's work, or interests. Ethics are something that are embittered in us from childhood. Remember when the teacher said, "Do not copy someone else's homework"? Or when the monitor asked to stand in the line. These simple etiquette and ethics help the environment to be more safe, friendly and co-operative for others around. Computer ethics are nothing but how we use our personal morals and ethics while using the computer for various purposes. They consist of all the rules that you would apply to not misuse any information that is not yours to use, or to access any data that is not owned by you. With issues like cyber crimes, plagiarism, hacking and password thefts, it has become important to know the importance of computer ethics to be able to create a safe computer-based environment.

✔ Prevents Misuse of Personal Information
Computers have made the world come closer, be it personally or professionally! Most of us find it more convenient to shop online rather than going out. For this we are asked to give out our personal information like name, date of birth and most importantly, our 'credit card information'! Ask yourself, if you know that people don't follow computer ethics everywhere, would you feel safe to give out all this information? On the contrary, if you have read their privacy policies and know that they abide by the cyber laws and computer ethics, you know for a fact that your personal information will not be misused.

✔ Prevents Theft of Intellectual Property
What is intellectual property? Well, unlike physical forms of properties like car or house, intellectual property refers to the property created by the mind! The internet consists of various intellectual properties which includes works of various researchers, writers, song artists and so on. Without the presence of computer ethics, the work created by the intellect of one person can be easily copied and plagiarized by someone else. Imagine how you would feel if your poetry has been copied and publicized under someone else's name? Now do you know what following computer ethics and privacy policies is important?

✔ Prevents Loss of Various Jobs in the field of Software Development
There are thousands of people globally that are working in companies that develop computer programs and software. However, if we find out a way to get these software without having to pay the price, most of us would prefer piracy over paying, right? Have you ever wondered, how this can cost the employees working in these companies their job. The general mentality of most of the people downloading software illegally is that these companies are very rich and it really wouldn't affect them..., even if it does, who cares? However, the point to be kept in mind is, what if the one who had to pay the price is someone close to you. Imagine, there are thousands of people getting involved in unethical downloads and distribution. In fact, a report reveals that a significant number of the people prefer never to pay for a software and get involved in piracy!

✔ Keeps you from being Unethical!
It's not that you need to follow computer ethics to show others. However, by following these ethics, you would know what you need to do to be a responsible user and keep yourself from getting into trouble by being unethical. Trouble? Well, yes, there are various laws that can put you behind bars if you are caught violating the privacy policies and norms of individual websites. I remember reading that a school had to pay almost $5 million as fine for using pirated software, it was later that they realized that getting a license would have been much more economical.

✔ Makes Your Computer a Better and Safe place to be At
Your computer is not just an electronic device for communication, it is your data store, your photo album, your work recorder, your social network, your calculator and what not..., it is what you are! If you get involved in downloading information or accessing portals that you are not allowed to, you are opening the doors of various issues and threats like viruses and Trojans that can illegally enter your system and crash it completely! On the other hand, if your system is used in the way it is supposed to, you are creating a safer and a better atmosphere wherein you can rest assured that your work and your personal information is absolutely safe and secure.

Computer ethics are something that cannot be imposed on you, it is rather something that should be followed out of your own will and desire. The way you use the computer to access information speaks a lot about you and your ethical values. What would you do if you get your colleague's password? Would you ask him or her to change it since you accidentally found out, or would you try to get some information that you are not supposed to? There are two kinds of people in this world, one who follow the rules and respect them at the same time, and the others who don't really care. Should you care about the ethics involved in becoming a responsible citizen? You decide! Nevertheless, if you are caught, rest assured the authorities won't care about you as well!


Monday, 4 January 2016

Element in Computer Ethics

COMPUTER ETHICS:-
1)NETIQUETTE
2)AREA OF COMPUTER ETHICS


    Netiquette

    Netiquette is network etiquette users should follow while on the Internet, or cyberspace. It consists of do's and don'ts of online communication. It is the conduct expected of individuals while online. So, as a conclusion, netiquette, or net etiquette, refers to etiquette on Internet.

    Areas Of Computer Ethics


    1. Information Accuracy
    One of the concern because many users access information maintained by other people or companies, such as on the Internet. Do not assume all the information on the Web is correct. Users should evaluate the value of a web page before relying on its content. Be aware that the organization providing access to the information may not be the creator of the information.

    2. Green Computing
    Involves reducing the electricity and environmental waste while using a computer. Society has become aware of this waste and is taking measures to combat it. Suggestions :
    • Do not leave the computer running overnight
    • Use paperless methods to communicate
    • Recycle paper
    • Use video conferencing and VOIP for meetings
    3. Codes Of Conduct
    Is a written guideline that helps determine whether a specific computer action is a ethical or unethical, or allowed or non-allowed. IT code of conduct :
    • Employees may not copy or use software illegally
    • Computers may not be used to steal
    • Employees may not meddle in other's computer files
    4. Information Privacy
    The right of individuals and companies to deny or restrict the collection use, and dissemination of information about them. How to safeguard personal information :
    • Clean your history file when you are finished browsing
    • Install a personal firewall
    • Do not reply to spam for any reason
    5. Intellectual Property
    Unique and original works such as ideas, inventions, literary and artistic works, processes, names and logos. Refer to the creation of mind used in commerce. There are three types of Intellectual Property : Patent, Trademark and Copyright.

    Patent
    Is an exclusive right granted for an invention.
    Example : KFC Recipe , iPhone design, Audi's design

    Trademark
    A distinctive sign which identifies certain goods or services
    Example : logo, slogan, colour

    Copyright
    Copyright is an exclusive right and gives its creator, or owner:
    • to reproduce the copyrighted work
    • to prepare derivative works
    • to distribute and sell any copies of the copyrighted work
    • to perform or display the copyrighted work publicly
    A legal term describing rights given to creators for their literary and artistic works. 
    Literary works - novels, poems, newspaper
    Artistic works - paintings, drawings, architecture