02 - Computing - ch5 - Security and Ethics
02 - Computing - ch5 - Security and Ethics
Security
When we talk about security, it is more on protecting and securing. Like for
example in a bulding, they hire security guards and install security cameras to
protect and secure the premises from intruders and burglar. Computer
security is how we protect our computer systems including the data in it that
we use.
There are several terminologies and key terms that we need to discuss in order
to further understand what Computer Security is all abou like Firewalls,
Encryptions, Antivirus and Network Security.
Firewalls, this are hardware or software that serve as protection for the inside
network. Same as to the concept of house firewalls, that prevents the fire from
coming in your house. Firewall also prevents unauthorized entry to ones
network.
And last but very important topic for this lesson is the network security.
Network Security, according to SANS.org, is the process of taking physical
and software preventative measures to protect the underlying networking
infrastructure from unauthorized access, misuse, malfunction, modification,
destruction, or improper disclosure, thereby creating a secure platform for
computers, users and programs to perform their permitted critical functions
within a secure environment. There are several terminologies that has relation
to Network Security like Honeypots and Honeynets.
Honey Pots is a clone system or clone server that is used to contain the
intruder or attackers into that system so that the Network Security Team will
have a chance to learn or gather information about that specific hacker.
According to SANS.org, Honey Pots can be setup inside, outsider or in the
DMZ of a firewall design or even in all of the locations although they are
most often deployed inside of a firewall for control purposes.
Honey Pots have what we call the levels of tracking and the common tracking
levels include the firewall, system logs and some other sniffer-based tools.
Honeynet is somehow the same as Honeypot except to the fact that Honey Net
talks about the whole set-up of the network infrastructure that has intentional
vulnerabilities to attract hackers or intruders. Data gathered by Network
INTRODUCTION TO COMPUTING
CHAPTER 5: TROUBLESHOOTING, SECURITY, AND ETHICS
LESSON 2 SECURITY AND ETHICS
Security analyst from this Honey nets are used to correct the vulnerabilities of
the network system.
Ethics
According to Wikipedia.com, Computer Ethics is a part of practical
philosophy which deals with how computing professionals should make
decision regarding professional and social conduct. This Computer ethics has
3 primary influences: 1) Individuals own personal code. 2) Any informal
code of ethical conduct that exists in the work place. 3) Exposure to formal
codes of ethics.
So, it only means that computer ethics is the norms or the behavior of a
computer professional or IT professional towards computing. There are
several terminologies that you as IT student should learn at this moment and it
is the Copyright and Plagiarisim.