0% found this document useful (0 votes)
5 views

Final Reviewer- Living in It Era

Uploaded by

mmagaway.vetmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Final Reviewer- Living in It Era

Uploaded by

mmagaway.vetmed
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

1|Page

Chapter 5: DIGITAL SECURITY, ETHICS, AND PRIVACY


Digital security risk- event or action that could cause loss or damage to computer or mobile device.
Computer crime – illegal act involving computer.
Cybercrime- online or internet-based illegal act.
DIGITAL GECURITY RISKS
1. hacker
2. cracker
3. script kiddie
4. corporate spies
5. unethical employee
6. cyberextertionist
7. cyberterrorist
HACKER

 BLACK HAT HACKERS ⁃ uses computer or technology unauthorized hackers.

 WHITE HAT HACKERS- overcoming technical problems


 GREYHAT HACKERS- in mid of black and white hacker; not creating crime; accessing
unauthorized companies.
CRACKERS -breaks security and violate system integrity; they do gain access; they gain authorized access
to destroy the data; remove your access to your network.
SCRIPT KIDDIE -starter; they rely to specific script or software; less experience in attacking a network or
personal computer.
CORPORATE SPIES- being hired by a company to spy their rival.
UNETHICAL EMPLOYEES- employee that breaks among employes, main reason is revenge.
CYBEREXTERTIONIST -includes threatening: includes negotiation (invade your personal information.)
CYBERTERRORIST - individuals who break into the internet or network; they are destroying or damaging
most especially political reasons or issues.

MALWARE – short for "malicious software " -consists of programs that act a user’s knowledge; alters the
operation of computers and mobile devices.
COMMON TYPE OF MALWARES:
1. VIRUS -affects or infects a computer or mobile device negatively by altering the way the
computer or device works without the user’s knowledge or permission.
2. WORM -program that copies itself repeatedly; possibly shutting down the computer or device,
or network; replicate on its own.
3. TROJAN HORSE - hides within or looks like a legitimate program; does not replicate itself to
other computer or networks; creates backdoor to make an entry for third party
2|Page

4. ROOTKIT - hides in a compute or mobile device and allows someone from a remote location to
take control of the computer or device.
5. SPYWARE -program placed on a computer or mobile device without the user's knowledge that
secretly collects information about the user and communicates the information it collects to
some outside source while the user is online.
6. ADWARE -program that displays on online advertisement in a banner, pop-up window, or pop-
under window on webpages, email messages or internet services.

A. BOTNET - compromised computers or mobile devices connected to a network. A compromised


computer or device is known as ZOMBIE (examples: Chatbot)
B. DENIAL OR SERVICE ATTACK (DOS ATTACK) - disrupts computer access to an internet service
- Distributed Dos attack (DDos attack) -online services, overwhelm clients - render websites or
services to not operate for the meantime.
C. BACKDOOR - a program/set of instructions in a program that allow users to bypass security
control.
D. SPOOFING ⁃ a technique intruders use to make their network or internet transmission appear
legitimate. They pretend as someone you can trust.
E. FIREWALL – hardware and/or software that protects a networks resource from intrusion.
UNAUTHORIZED ACCESS -use of computer or network without permission.
UNAUTHORIZED USE - use of computer or data for unapproved or possibly illegal activities.
ACCESS CONTROL - who can access a computer or device, or network; when they can access it; and what
actions they can take while accessing it.
PASSPHRASE - private combination of word, contain mixed capitalization and punctuation, associated
with a user name.
PIN (personal identification number) - called as PASSCODE, a numeric password, either assigned by a
company or selected by user.
POSSESSED OBJECT -any item that you must possess of carry with you,in order to gain access to a
computer or compare facility (ex. cards for hotel, or ID’s)

BIOMETRIC DEVICE: authenticates a person's identity by translating a personal characteristic in a digital


code. (ex. fingerprint, voice ID, face ID or recognition)
 Fingerprint reader
 Face recognition system
 Hand geometry system
 Voice verification system
 Signature verification system
 Iris verification system
TWO STEP VERIFICATION – uses two separate methods to verify identity of a user.
3|Page

DIGITAL FORENSICS - discovery, collection, and analyses of evidence found on computers and networks.
Many areas of digital forensics:
 Law enforcement
 Criminal prosecutors
 Military intelligence
 Insurance agencies
 Information security departments
SOFTWARE THEFT- someone steals software media intentionally erases programs; illegally copies
programs.
LICENSE AGREEMENT - right to use the software.
INFORMATION THEFT - occurs when someone steals personal or confidential information.
ENCRYPTION - process of converting data that in readable by humans into encoded characters to
prevent unauthorized access.
DIGITAL SIGNATURE- an encrypted code that a person, website, or organization attaches to an electronic
message to verify the identity of the message sender.
DIGITAL CERTIFICATE- a notice that guarantees a user or a website is legitimate.
SECURE SITE- a website that uses encryption techniques to secure its data.
HARDWARE THEFT- act of stealing digital equipment.
BACK-UP -a duplicate of a file, program or media that can be used if the original is lost, damaged, or
destroyed.
OFF-SITE BACKUPS- stored in a location separate from the computer or mobile device site.
Categories of backups:
 FULL BACKUP- copies all of files on media in the computer.
 DIFFERENTIAL BACKUP- copies only the files that have changed since the last full backup.
 INCREMENTAL BACKUP- copies only the files that have changed since the last full or incremental
backup.
 SELECTIVE BACKUP- user choose which folders and files to include in a backup.
 CONTINUOUS DATA PROTECTION (CDP)- all data is backed up whenever a change is made.
 CLOUD BACKUP- files are backed up to the cloud as they change.

TECHNOLOGY ETHICS- more guidelines that govern the use of computers, mobile devices, information
systems, and related technologies.
4|Page

INTELLECTUAL PROPERTY- refers to unique and original works such as ideas, inventions, art and
writings.. and logos.
INTELLECTUAL PROPERTY RIGHTS- are the rights to which creators are entitled to their work.
COPYRIGHT- protects any tangible form of expression.
DIGITAL RIGHTS MANAGEMENT (DRM)- strategy designed to prevent illegal distribution of movies,
music, and other digital content.
CODE OF CONDUCT- a written guideline that helps determine whether a specification is ethical/
unethical or allowed or not allowed.
GREEN COMPUTING- involves reducing the electricity and environmental waste while using computer,
mobile devices, and related technologies.
INFORMATION THEFT- refers the light of individuals and companies to deny or restriction the collection,
use and dissemination of information about them.
COOKIE- small text file that a web server stores on your computer.
Reasons why website use cookie:
 Allow personalization
 Store user names and/or passwords
 Assist with online shopping
 Track how often the users visit a site
 Target advertisement
PHISING- scam in which a perpetrator sends an official looking email message that attempts to obtain
your personal and/or financial information.
SOCIAL ENGINEERING- defined as gaining unauthorized access to or obtaining confidential information
by taking advantage of the trusting human nature or some victims and the naivety of others.
EMPLOYEE MONITORING- involves the use of computers, mobile devices, or cameras to observe, record,
and review an employee’s use of a technology.
CONTENT FILTERING- process of restricting certain material.
WEB FILTERING SOFTWARE- restricts access to specified websites.

You might also like