Security and Ethics Safeguards and Codes of Conduct
Security Computer Security Risk - any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capabilities Computer Crimes - any illegal act involving a computer Cybercrime - online or Internet illegal acts
Common Security Risks Computer Viruses Worms Trojan Horses Unauthorized Access and Use Information Theft System Failure
Safeguards Against Malicious- Logic Programs Never start with a floppy disk Only use a trusted source with attachments Always install an antivirus program Set macro security Check all downloaded programs Write protect recovery disks Back-up files often Stay informed with new virus alerts.
Unauthorized Access Cracker/Hacker — Someone who tries to access a computer or network illegally Acceptable Use Policy (AUP) — A written policy that outlines the activities for which a computer and network may or may not be used
Safeguards Against Unauthorized Access and Use Firewalls Intrusion Detections Access Controls Audit Trails
Hardware Theft and Vandalism Hardware Theft — The act of stealing computer equipment Hardware Vandalism — The act of defacing or destroying computer equipment
Safeguards Against Hardware Theft and Vandalism Limit physical access Install alarm systems Use locking devices Monitor mobile devices at all times Use passwords
Software Theft Software Theft — The act of stealing software media, intentionally erasing programs, or illegally copying programs Software Piracy — The unauthorized and illegal duplication of copyrighted software
Safeguards Against Software Theft Keep originals in a secure place Escort terminated employees off premises Issue user licensing agreements
Information Theft Information Theft - the act of stealing personal or confidential information Information Theft is often linked to other types of computer crimes Use Identification Controls Encrypt Sensitive Information Use Virtual Private Networks Safeguards
Ethics and Society Computer Ethics - The moral guidelines that govern the use of computers and information Intellectual Property Rights - The protection of unique and original works Copyright - The exclusive rights granted to an author
Information Privacy Codes of Conduct Electronic Profiles Cookies Cookie Managers Spyware Spam Privacy Laws Employee Monitoring Content Filtering Filtering Digital Signatures
Health Concerns of Computer Use Repetitive Strain Injury (RSI) Carpal Tunnel Syndrome Tendonitis Computer Vision Syndrome OSHA Guidelines Hand Exercises Eyestrain Ease Ergonomics Green Computing Energy Star Computer Addiction