You are on page 1of 3

CSC 134/March 2020 – July 2020

UNIVERSITI TEKNOLOGI MARA


CAWANGAN PERLIS

CSC 134
COMPUTER AND INFORMATION PROCESSING
LECTURE ASSIGNMENT

Title : ​Security, Privacy, and Ethic Ergonomic

Program / Group : ​AS120​4G

Date of Experiment : ​19/05/2020

Lecturer : ​Madam Haryati Fauzi

Name Matrix No

1. Nur Arinah Binti Mohamad 2018445848


2. Nur Syasya Binti Abdul Aziz 2018235302
Question:

1. Give the definition of SECURITY, PRIVACY, ETHICS & ERGONOMICS (4


marks)

● Security - It involves protecting individuals or organizations from theft and


danger. A digital security risk is any event or action that could cause a loss of or
damage to a computer or mobile device hardware, software, data, information, or
processing capability.
● Privacy - It concerns the collection and use of data about individuals or
companies to deny or restrict the collection, use, and dissemination of
information about them.
● Ethics - It is a standard of moral conduct where computer Ethics as a guidelines
for the morally acceptable use of computers.
● Ergonomics - The study of human factors related to things people use. It also
devoting to incorporating comfort, efficiency, and safety into the design of items
in the workplace

2. CYBER BULLYING is the use of the Internet to send or post content intended
to hurt or embarrass another person. Give four examples of cyberbullying. (4 marks)

● Stealing someone’s password and impersonating them online


● Harassing or threatening someone or sending mean messages through
instant messages (IMs), phone calls, text messages or emails
● Engaging someone in instant messaging and tricking them into revealing
personal information and then forwarding that information to others
● Spreading gossip, secrets or rumors about another person that will damage
that person’s reputation
3. Restricting access may help protect a computer from unauthorized access.
Elaborate four ways on how you can implement restricting access to your computer /
device / office. (12 marks)

Ways on how ones can implement restricting access to computer / device / office is
by :

1. Using a biometric scanning. A biometric device authenticates a person’s


identity by translating a personal characteristic into a digital code that is
compared with a digital code in a computer or mobile device verifying a
physical or behavioral characteristic.
2. Using a passphrase. It is more likely​ a password, but longer and more secure.
It​ is a private combination of words, often containing mixed capitalization and
punctuation, associated with a user name that allows access to certain
computer resources
3. Using a personal identification number (PIN) sometimes called a passcode. It
is a secure alphanumeric or numeric code used for authenticated access to a
system. A PIN serves as a validation tool for users of various types of
networks and systems either assigned by a company or selected by a user.
4. Using a ​possessed object. It is any item that you must possess, or carry with
you, in order to gain access to a computer or computer facility.​Examples of
possessed objects are keys, cards, smart cards, badges. An ATM card is a
possessed object that gives access to a bank account.

You might also like