You are on page 1of 1

Name: Lapinig, Debbie Shane B.

Date: June 4, 2021

Week 6-8

ICT SECURITY

Answer the following questions below:

1. Name at least two (2) Security Issues and what do you think is/are the solution/s for that issues.
(10 points)
 Truth issues. This refers to manipulating digital data. I think the solution for this is to
stop producing information that is manipulated in inappropriate way. We should stop
manipulating sounds and images that is illegal or not appropriate in presenting
information and output.
 Quality-of-life issues especially mental-health problems. We have the right to keep our
mental health stable and as what I’ve noticed, we, especially children are exposed to
technologies at a very young age, and we cannot deny that computer is one of the reasons
why cybercrimes existed. Exposure to computers may lead you to online addiction and on
top of that, minors are exposed to pornography. So for these to be prevented, we should
limit and monitor the minors in using the computer according to its purpose. We should
also educate them on these things so that we can prevent them in acquiring inappropriate
behaviors.

2. As a student, what are some of the personal security safeguards you could use? (5 points)
One of the personal security safeguards I can use is the protection of software
and data. As a student, it is very important to store files in the computer which may
access by unauthorized person easily if they want to. Through this security safeguards, it
restricts others to access online files and gain important data. It uses audit controls to
track who used, what programs and servers, which files were opened, and so on. It also
uses people controls such as screen applicants, background checks, email, etc.

3. Compare surveillance and spying? (10 points)

The concept of surveillance entails keeping continuous and close watch on an


individual or group. It is a common dynamic security measure. Also, surveillance largely
has legal authority, and this is irrespective of the type of security cameras. Spying, on the
other hand, deploys clandestine means to extract secret information. It is often without
due authorization.

You might also like