201910_Topic_5_Digital_Security_Ethics_and_Privacy_revised_080919.pdf

This preview shows page 1 - 3 out of 7 pages.

1Digital Security,Ethics and PrivacyTopic 5Learning Outcomes1.Define digital security risks2.Describe various types of security risks3.Explain ways to safeguard against security risks4.Describe the Ten Commandments of Cyber EthicsDigital Security RisksA digital security risk is any event or action that could cause aloss of or damage to a computer or mobile device, hardware,software, data, information, or processing capability.Common security risks include:MalwareUnauthorised access and useInformation theftSoftware theftHardware theftSystem failureMalwareMalware, short for malicious software, consists of programsthat act without a user’s knowledge and deliberately:alters the operations of a computer or mobile device, andperforms destructive acts on a computer or mobile device.An infected computer or device has one or more of thefollowing symptoms:Operating system runs much slower than usualSystem properties are changedAvailable memory is less than expectedFiles become corruptedPrograms or files do not work properlyExisting programs and files disappearUnknown programs or files mysteriously appearMalwareCommon types of Malware includes:TypeDescriptionVirusAffects a computer or mobile device negatively by altering theway the computer or device worksWormCopies itself repeatedly, using up resources and possibly shuttingdown the computer, device, or networkTrojan horseHides within or looks like a legitimate program and designed tofind sensitive information located on the infected computer ordeviceRootkitHides in a computer or device and allows someone from aremote location to take full control of the computer or deviceAdwareDisplays an online advertisement in a banner, pop-up window, orpop-under window on webpages, email messages, or otherInternet servicesSafeguards against MalwareUse antivirus software and update the software regularlyBe suspicious of all unsolicited email attachmentsScan all downloaded programs before installingScan any removable media before useBack up computer or device files regularly
2Unauthorised Access and UseUnauthorised AccessUse of a computer, device, or network without permissionUnauthorised UseUse of a computer, device, or its data for unapproved or possibly illegalactivitiesCommon technique used in unauthorised access and use:Hackingis the use of computer to break into another computer,device, or network without authorisation.Safeguards against UnauthorisedAccess and UseAccess controlis a security measure that defines who canaccess a computer, device, or network, when a user can access itand what actions the user can take while accessing it.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 7 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
NoProfessor
Tags
Cryptography, theft, Computer program

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture