Posts

Showing posts from March, 2018

SECURITY MEASURES

Image
SECURITY MEASURES Definition of security measures: The precautionary measures taken toward possible danger or damage. DATA BACKUP A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. Data loss can be caused by many things ranging from computer viruses, hardware failures, file corruption, system failure or theft.  Definition Benefits Importance To copy files to a second medium (a disk or tape) as a precaution in case the first medium fails In the case of system failure, you can restore the files by copying the backed up files to their original location. Prevent against data loss CRYPTOGRAPHY Cryptography Encryption Decryption Technology of encoding information so it can only be read by authirized individuals. Process of converting readable data i

TYPES OF COMPUTER SECURITY RISKS

Image
TYPES OF COMPUTER SECURITY RISKS Definition : Any event or action that could cause a loss of damage to computer hardware,software,data,information or processing capability. MALICIOUS CODE (Virus,Worm,Trojan Horse) Malicious code is code causing damage to a computer or system. It is code not easily or solely controlled through the use of anti-virus tools. Computer Virus Definition : A computer virus is a potentially damaging computer program that affects or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. Examples: Melissa, Tequila, Cascade, Invader   Worm A worm is a program that copies itself repeatedly. For example in memory or on a network, using up resources and possibly shutting down the computer or network. Examples: Jerusalem, Sobig,   Nimda, Morris Worm Trojan Horse A program that hides within or looks like a legitimate program. It does not replicate itself to other comput

AREAS OF COMPUTER ETHICS

Image
AREAS OF COMPUTER ETHICS Definition : The moral guidelines that govern the use of computers,mobile devices and information. INFORMATION ACCURACY Many users access information maintained by other people or companies such as on the Internet. Do not assume all the information on the Web is correct. User should evaluate the value of a web page before relying on its content. Be aware that the organization providing access  to  the information may not be the creator or the information. GREEN COMPUTING Green computing is the environmentally responsible and eco-friendly use of computers and their resources. In broader terms, it is also defined as the study of designing, manufacturing/engineering, using and disposing of computing devices in a way that reduces their environmental impact. Reduce the electricity and environmental waste while using computer. Action that has been taken : Using energy - efficient devices that require little power when they are not i

RULES OF NETIQUETTE

Image
RULES OF NETIQUETTE Netiquette or net etiquette (etiquette on the Internet ) Is the code of acceptable behaviours users should follow while on the Internet or online cyberspace. It is conduct expexted of individuals while online. For : WWW,E-mail,Instant Messaging,Chat room,Newsgroup & message board. Image 1 NETIQUETTE GUIDELINES FOR ONLINE COMMUNICATIONS  Image 2 Golden Rule : Treat others a you would the to treat you. Be polite.Avoid offensive language. Avoid sending or posting flames,which are abusive or insulting messages.Do not participae in flame wars,which are exchanges of flames. Be careful when using sarcsm and humor,as it migh tbe misinterpreted. Do not use all captal letters,which equivalent of SHOUTING! Use emoticons to express emotion. Clearly identify spoiler,which is a message that reveals an outcome to a game or ending to a movie or program. Be forgiving of other's mistakes. Read the FAQ,if one exist. Image 3