Download presentation
Presentation is loading. Please wait.
Published byEdgar Nichols Modified over 9 years ago
1
Course: Introduction to Computers Lecture: 6
2
Commercial software is covered by Copyrights. You have to pay for it and register to have the license. You should do the following: Copy the software only for back up. Don’t share the software with other people. Copying the software over the network should be under the terms of license agreement. Software piracy is a crime.
3
When you buy a software you purchase a license to use it not for copyright. There is a license agreement that written on the back of the carton or in the software installation start. There are two type of license: A Single user license : can install the software into only one computer. A multi-use license : can install the software into a number of computers, the number that is specified by the license agreement.
4
Commercial software: Any software you buy is a commercial software. ”Has copy rights”. Trail Software: Software where you can install it via the internet or CD’s for a period of time, after this period the software will stop working. ”Has copy rights”. Free Software : Software that is distributed freely on the internet, there is no payment. ”Has copy rights”. Public Software: It is public, free, without copy rights.
5
Copy your software, files and information. Use it when your original copies are damaged. Backups can be made by different methods: Copy onto external HD, CD’s, DVD’s, … etc. Backups must be made on regular basis. Can use automatic back-up programs. Keep it in a secure and safe place. Keep different copies in different places. Label it. Disks should be write-protected.
6
Information Security: is a system of guarantees for protecting information technology against disasters, system failure, unauthorized access that can result in damage or loss. Security not only involved physical security, but also the security of the data. Do the following: Computer must be protected from damage (hardware, software). Data must be backed up and protected from viruses. Password must be used. Use encryption and decryption cods. Use anti-viruses.
7
Means maintaining data confidentiality and no one is authorized to access them. You should follow these points to protect the privacy of others: Use of data: for one or more people or for specified purposes. Retention of data: shall not kept for longer than necessary. Disclosing information: for anything than the purpose. Security. Rights for the person to access his information.
8
Access for only who have a legitimate right to access to them through the following: User Passwords User Authentication User Authorization
9
Computer Crimes : Are the unlawful uses of any component of a computer system. Computer crimes issues such as: fraud, espionage, fraud, vandalism and theft issues.
10
The theft of a laptop computer will causes the access to a confidential files, and loss of important contact details. Never leave your laptops, PDAs in a public places.
11
They are software programs, which are written with the intention of causing inconvenience and disruption of series damages in a computer system. Viruses Spread ways: Computer networks. Copying and distribution of illegal software through the internet. Email attachments.
12
Viruses cont. 12 Types of viruses: Worms. Time bombs. Boot-sector virus. File virus. Multipartite virus. Macro viruses. Trojan horse.
13
It is important to keep the Anti-virus software up-to-date. (updated) Example on famous anti viruses: Avira, Norten, Avast..etc Do the following if don’t have the last update: Do not use CD from unreliable source. Use only registered software. Never open an e-mail attachment unless it is from a reliable source. Keep regular back-up.
14
Symptoms of Virus Attack 14 Computer runs slower then usual Screen sometimes flicker System crashes for no reason Files/directories sometimes disappear Display a message
15
With computing systems became personal data stored in all areas (health - banks - telecommunications companies, electricity and water - Internet companies - government entities - insurance companies - social security, etc.) Your personal data is no longer yours alone (the possibility of counterfeiting and Change) There is legislation that protects personal data have been enacted in some countries. Ex: you can check if your ID used in somewhere (work field)without you know by check this out: http://mol.gov.sa/Services/Inquiry/SaudiEmpInquiry.aspx?m=4 http://mol.gov.sa/Services/Inquiry/SaudiEmpInquiry.aspx?m=4
16
Set of rules that’s controls the use and the users of the computer and the result data. The data processor or the data user must know that: It is personal data shall be processed, fairly and lawfully. To use the data for the purpose that it was collected. To keep the information accurate and up to date. To keep the data safe and never disclose it to other. To retain the information only as long as required. To provide access to person whom the data refers to, upon request.
17
The following data types are excluded from the ethics above: Data for national security protection. Data of retirement salaries. Personal data for family purposes.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.