We bring to you all what you should know about, computer virus, computer security and computer ethics.
A lot of people have been coming to me saying they don't know how they are computrr malfunction, they have been seeing different things on their systems a lot of things have been going on but you don't know how to rectify it.
01.1 Sources of Measures
01.2 Preventive Measures
01.3 Legal Issues
Computer Virus
Computer Virus which can also be called worms is a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data.
An infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to be seen by light microscopy, and is able to multiply only within the living cells of a host.
"the hepatitis B virus"
Computer security
Computer security is the protection of computer components such as hardware, software, and data from an unauthorized access.
The need for computer security is as a result of a number of security breaches.
computer security, also called cybersecurity, the protection of computer systems and information from harm, theft, and unauthorized use. Computer hardware is typically protected by the same means used to protect other valuable or sensitive equipment—namely, serial numbers, doors and locks, and alarms.
Computer Ethics
Computer ethics is a field of applied ethics that addresses ethical issues in the use, design and management of information technology and in the formulation of ethical policies for its regulation in society.
01.0 learning objectives
On the completion of this chapter, you should be able to;
- State the sources of security breaches in computer network.
- State preventive measures against security breaches.
- State legal importance to consider when using ICT.
01.1 Sources of security breaches
Security Breach is an act of breaking security, policies or procedures. When security in computer is breached,it may result in the damage of vital files, failure of certain computer hardware components i.e Keyboard, Mouse e.t.c. missing files, altered software programs e.t.c.
The following are possible source of security breaches.
1. Computer Viruses
2. Hackers
3. Poor implemented computer network
4. Poorly implemented or lack of ICT policy.
5. Carelessness.
Computer Viruses
A computer virus is an executable program that is capable of replicating itself thereby causing great harm to files or other programs on the computer it infects.
A computer virus can spread easily from one computer to another with the use of storage media such as: Flash drives, floppy disk e.t.c it can also be transferred by downloading an infected file from the internet. Examples of Viruses are: Asimov.1539, stator e.t.c. The two types of computer Viruses are:
- Worms
A worm is a virus program that copies and multiplies itself by using computer networks and security flaws.
A classic example of a worm is I LOVE YOU virus downloaded in 2000.
Example of latest one what is stuxnet (discover in July 2010).
- Trojan horses
Trojan horse is a computer or file on the computer of a user that makes the computer susceptible to malicious intruders by allowing them to access and read users files.
Trojan horses do not multiply themselves as in the case of worms. An example of the latest trojan horse is Alureon (discovered in 2010).
Hackers
The hacker is a clever programmer who tries to break into computer systems. Can understand the weak points in a security system and write a program that will utilise the system. They are sometimes responsible for writing computer virus codes.
Poorly implemented computer network
A complex computer network may result in to poor implementation and management which in turn will give room to intruders who will eventually away the computer network to steal passwords confidential files or even affect all the network files.
Network Invaders also launches denial-of-service (DOS) attack which occurs when a network is bombarded with bogus requests premature successful connection messages, and/or other commands which may deny ledger teammate uses ability to get on the network and may even cause the network to crash.
Poorly implemented or lack of ICT policy
When ICT security policies that controls or maintains the order in which people should conduct themselves when using ICT facilities exist due to poor implementation or ignorance lawlessness will be in place and this can lead to security breach.
Carelessness
Carelessness is a major contribution to security breaches these include being careless with information storage devices password movement of people and so on.
01.2 Preventive measures
Some preventive measures to avoid damages caused by security breaches are presented below:
- Use of antivirus software: antivirus software is able to protect the computer from virus. If the where did it is able to detect the virus and heal the system. In some cases the infected file is deleted. Examples of good antivirus software are: ESET, Norton, Symantec and many others.
- Using firewall: in firewall is a device or set of devices designed to permit or deny network transmission based oppo new set of rules and is frequently used to protect network from unauthorised access while permitting legitimate communications to pass.
- Play should be taken to ensure that personal information (such as password email addresses e.t.c) is not disclosed to any person through any means. It is advised that person should change their password often and when they notice any intrusion.
- Encryption: encryption is the conversion of data into a form that cannot be easily understood by unauthorised people. Decryption is the process of converting my data back into its original form so it can be understood.
- There is a need to have a proper network implementation and management policies.
- Site with security certificate because they are secured.
- Do not download file attachments from unknown sources
- Read about new hacking technologies and preventive measures frequently to keep you updated.
01.3 Legal issues
Some computer security issues considered here are:
- Piracy
- Cybercrime
- Identity theft
- Internet fraud
- Hacking.
Piracy
Piracy is the unauthorized reproductiop or use of a copyrighted material, book, recording, television program, patented invention, trademarked product, etc.: In Nigeria, many software pirated. The use of pirates software is a violation of the manufacturer's licence agreement and it is a criminal offence to use pirated software.
Cybercrime
Computer crime or cybercrime described as the crime committed by means of computers or the internet. Examples of cybercrime are internet fraud, identity theft, hacking etc
Identity theft
Identity theft is a cyber crime that involves stealing of someone's else identity by pretending to the actual person. A common form of identity theft is the ATM/credit card text whereby a person's ATM pin is used to withdraw on behalf of the account holder without their authorization.
Internet fraud
Internet fraud refers to the use of internet to conduct tablets at transactions. It includes paying for a purchase with a credit cards, counterfeiting postal money orders, outright stealing from person's account and so on.
Hacking
Hacking is the unauthorised access and use of computer and network resources. The person who consistently engages in hacking activities as a lifestyle is called a hackers. A common example of a method used by hacker is an email with a program that either automatically runs or the runs when the attachment is clicked.
Are you satisfied with what you read please get back to us @ infoatinstantmusic9ja@gmail.com
Don't forget to share, comment and subscribe.
1 Comments
Wow 💚💚💚
ReplyDeleteThanks for visiting our site.........