Presentation is loading. Please wait.

Presentation is loading. Please wait.

Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.

Similar presentations


Presentation on theme: "Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license."— Presentation transcript:

1 Course: Introduction to Computers Lecture: 6

2  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.  You should do the following:  Copy the software only for back up.  Don’t share the software with other people.  Copying the software over the network should be under the terms of license agreement.  Software piracy is a crime.

3  When you buy a software you purchase a license to use it not for copyright.  There is a license agreement that written on the back of the carton or in the software installation start.  There are two type of license:  A Single user license : can install the software into only one computer.  A multi-use license : can install the software into a number of computers, the number that is specified by the license agreement.

4  Commercial software: Any software you buy is a commercial software. ”Has copy rights”.  Trail Software: Software where you can install it via the internet or CD’s for a period of time, after this period the software will stop working. ”Has copy rights”.  Free Software : Software that is distributed freely on the internet, there is no payment. ”Has copy rights”.  Public Software: It is public, free, without copy rights.

5  Copy your software, files and information.  Use it when your original copies are damaged.  Backups can be made by different methods:  Copy onto external HD, CD’s, DVD’s, … etc.  Backups must be made on regular basis.  Can use automatic back-up programs.  Keep it in a secure and safe place.  Keep different copies in different places.  Label it.  Disks should be write-protected.

6  Information Security: is a system of guarantees for protecting information technology against disasters, system failure, unauthorized access that can result in damage or loss.  Security not only involved physical security, but also the security of the data.  Do the following:  Computer must be protected from damage (hardware, software).  Data must be backed up and protected from viruses.  Password must be used.  Use encryption and decryption cods.  Use anti-viruses.

7  Means maintaining data confidentiality and no one is authorized to access them.  You should follow these points to protect the privacy of others:  Use of data: for one or more people or for specified purposes.  Retention of data: shall not kept for longer than necessary.  Disclosing information: for anything than the purpose.  Security.  Rights for the person to access his information.

8  Access for only who have a legitimate right to access to them through the following:  User Passwords  User Authentication  User Authorization

9  Computer Crimes : Are the unlawful uses of any component of a computer system.  Computer crimes issues such as:  fraud, espionage, fraud, vandalism and theft issues.

10  The theft of a laptop computer will causes the access to a confidential files, and loss of important contact details.  Never leave your laptops, PDAs in a public places.

11  They are software programs, which are written with the intention of causing inconvenience and disruption of series damages in a computer system.  Viruses Spread ways:  Computer networks.  Copying and distribution of illegal software through the internet.  Email attachments.

12 Viruses cont. 12  Types of viruses:  Worms.  Time bombs.  Boot-sector virus.  File virus.  Multipartite virus.  Macro viruses.  Trojan horse.

13  It is important to keep the Anti-virus software up-to-date. (updated) Example on famous anti viruses: Avira, Norten, Avast..etc  Do the following if don’t have the last update:  Do not use CD from unreliable source.  Use only registered software.  Never open an e-mail attachment unless it is from a reliable source.  Keep regular back-up.

14 Symptoms of Virus Attack 14  Computer runs slower then usual  Screen sometimes flicker  System crashes for no reason  Files/directories sometimes disappear  Display a message

15  With computing systems became personal data stored in all areas (health - banks - telecommunications companies, electricity and water - Internet companies - government entities - insurance companies - social security, etc.)  Your personal data is no longer yours alone (the possibility of counterfeiting and Change)  There is legislation that protects personal data have been enacted in some countries.  Ex: you can check if your ID used in somewhere (work field)without you know by check this out:  http://mol.gov.sa/Services/Inquiry/SaudiEmpInquiry.aspx?m=4 http://mol.gov.sa/Services/Inquiry/SaudiEmpInquiry.aspx?m=4

16  Set of rules that’s controls the use and the users of the computer and the result data.  The data processor or the data user must know that:  It is personal data shall be processed, fairly and lawfully.  To use the data for the purpose that it was collected.  To keep the information accurate and up to date.  To keep the data safe and never disclose it to other.  To retain the information only as long as required.  To provide access to person whom the data refers to, upon request.

17  The following data types are excluded from the ethics above:  Data for national security protection.  Data of retirement salaries.  Personal data for family purposes.


Download ppt "Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license."

Similar presentations


Ads by Google