You are on page 1of 9

@H_FLAIG

Hamad alfadhli

Chapter 10

The System Unit

Q-What is the Privacy?

‫خ ؟‬١‫ط‬ٛ‫ اٌخظ‬ٟ٘‫ِب‬

ANSWER

concerns the collection and use of data about individuals


‫ب ثشىً ِٕفشد‬ِٙ‫اعزخذا‬ٚ ‫بٔبد‬١‫ عّغ اٌج‬ٟ٘

Q-What is the Three privacy issues?

‫خ ؟‬١‫ط‬ٛ‫ب اٌضالس اٌّخزظخ ثبٌخظ‬٠‫ اٌمؼب‬ٟ٘‫ِب‬

ANSWER

1- Accuracy ‫ اٌذلخ‬: relates to the responsibility of those who collect data to


ensure that the data is correct ‫بٔبد‬١‫ْ ثغّغ اٌج‬ِٛٛ‫م‬٠ ٓ٠‫ رخزض ثبألشخبص اٌز‬ٟ٘
‫ب‬ٙ‫دلز‬ٚ ‫ب‬ٙ‫اٌزأوذ ِٓ طؾز‬ٚ
2- Property ‫خ‬١‫ق اٌٍّى‬ٛ‫ ؽم‬: relates to who owns data and rights to software ٟ٘
‫بٔبد‬١‫ْ ٘زٖ اٌج‬ٛ‫ٍّى‬٠ ٓ٠‫رخزض ثبألشخبص اٌٍز‬
3- Access ‫ي‬ٛ‫ االرْ ثبٌذخ‬: relates to the responsibility of those who have data to
control and able to use that data ‫خ‬١‫ُ طالؽ‬ٌٙ ٓ٠‫بد االشخبص اٌز‬١ٌٚ‫رزؼٍك ثّغؤ‬
‫بٔبد‬١‫اعزخذاَ ٘زٖ اٌج‬

Q-what is the Data gatherers ?

‫بٔبد ؟‬١‫ عّغ اٌج‬ٛ٘ ‫ِب‬

ANSWER

‫خ‬١ٔٚ‫خ اٌىزش‬١‫ف‬٠‫ْ ثأٔشبء ٍِفبد رؼش‬ِٛٛ‫م‬٠ٚ ‫ب‬ٌٙ ‫عطبء‬ٌٛ‫ ا‬ٚ‫بٔبد ا‬١‫ اٌج‬ٟ‫ُ٘ عبِؼ‬

Q-what is the Large Databases - Issues?

‫شح ؟‬١‫بٔبد اٌىج‬١‫اػذ اٌج‬ٛ‫ ل‬ٟ٘ ‫ِب‬

1
@H_FLAIG
Hamad alfadhli

ANSWER

 Collecting public, but personally identifying information ِٗ‫ِبد ػب‬ٍٛ‫عّغ ِؼ‬


‫ِبد‬ٍٛ‫خ ٌٍّؼ‬١‫خ اٌشخظ‬٠ٌٛٙ‫ذ ا‬٠‫ِغ رؾذ‬
 Spreading information without personal consent ‫ش‬١‫ِبد ِٓ غ‬ٍٛ‫ٔشش اٌّؼ‬
‫خ‬١‫افمبد اٌشخظ‬ٌّٛ‫ا‬

Q-What is the effect of Spreading inaccurate information ?

‫ِبد خبؽئخ ؟‬ٍٛ‫شاْ ٔشش ِؼ‬١‫ رأص‬ٟ٘‫ِب‬

ANSWER

1- Mistaken identity ‫خ‬١ٍ‫خ االط‬٠ٌٛٙ‫ذ ا‬٠‫ رؾذ‬ٟ‫خطأ ف‬


2- Freedom of Information Act ‫خ‬١‫بد اٌشخظ‬٠‫اٌؼًّ ػذ اٌؾش‬

Q-What is the Snoopware ?

‫خ ؟‬٠‫ ثشاِظ اٌّزبثؼخ اٌغش‬ٟ٘‫ِب‬

ANSWER

programs that records everything you do on the computer

‫رش‬ٛ١‫ اٌىّج‬ٟ‫َ اٌّغزخذَ ثؼٍّٗ ف‬ٛ‫م‬٠ ٟ‫ً وً ش‬١‫َ ثزغغ‬ٛ‫ ثشاِظ رم‬ٟ٘

A proposed law could prohibit this type of electronic monitoring

‫خ‬١ٔٚ‫ع ِٓ اٌّشالجخ االٌىزش‬ٌٕٛ‫ِٕغ ٘زٖ ا‬ٚ ُ٠‫ْ ِمزشػ ثزغش‬ٛٔ‫ػغ لب‬ٚ ُ‫ر‬

Q-What is the Illusion of anonymity ?

‫خ ؟‬٠ٌٛٙ‫ذ ا‬٠‫ ػذَ رؾذ‬ٛ٘ ‫ِب‬

ANSWER

–Not concerned about privacy when surfing the Internet ‫خ ػٕذ‬١‫ط‬ٛ‫ط‬ٛ‫زُ ثبٌخ‬ٙ٠ ‫ال‬
َ‫خ ٌٍّغزخذ‬٠ٛ٘ ‫ذ‬٠‫ؾزبط ٌزؾذ‬٠ ‫ش اْ رظفؼ االٔزشٔذ ال‬١‫رظفؼ االٔزشٔذ ؽ‬

–Not concerned about privacy when sending e-mail ‫خ ػٕذ اسعبي‬٠ٌٛٙ‫ذ ا‬٠‫زُ ثزؾذ‬ٙ٠ ‫ال‬
‫خ‬١ٔٚ‫اٌشعبئً االٌىزش‬

2
@H_FLAIG
Hamad alfadhli

Q-What is the History file ?

‫بٔبد اٌّؤسخخ ؟‬١‫ اٌج‬ٟ٘‫ِب‬

ANSWER

Includes the locations of sites visited by your computer system


‫رش‬ٛ١‫بص اٌىّج‬ٙ‫ب ِٓ خالي ع‬ٙ‫بسر‬٠‫ رُ ص‬ٟ‫خ اٌز‬١ٔٚ‫الغ االٌىزش‬ٌّٛ‫ رشًّ ا‬ٟ٘

Q-Who is the

two basic types of the Cookies ?


‫خ ؟‬١‫ف‬١‫ٓ ٌٍٍّفبد االسش‬١١‫غ‬١‫ػبْ اٌشئ‬ٌٕٛ‫ ا‬ٛ٘‫ِب‬
ANSWER

1- Traditional ‫خ‬٠‫ اٌؼبد‬: provide information to a single site ‫لغ‬ٌّٛ ‫ِبد‬ٍٛ‫رمذَ ِؼ‬
‫اؽذ فمؾ‬ٚ
2- Ad network or adware cookies: record your activities across different
sites‫لغ‬ِٛ ِٓ ‫ِبد ٌٕشبؽبد اٌّغزخذَ خالي رظفؾٗ ألوضش‬ٍٛ‫رمذَ ِؼ‬

Cookies ‫الغ‬ٌّٛ‫بٔبد ا‬١‫ ؽفع ث‬ٍٝ‫رش ػ‬ٛ١‫رغبػذ اٌىّج‬ٚ ‫بص‬ٙ‫ اٌغ‬ٟ‫ ٍِفبد رخضْ ف‬ٟ٘ َ‫ثشىً ػب‬
ٞ‫ ِشاد آخش‬ٟ‫لغ ػٕذ ؽٍجٗ ِٓ اٌّغزخذَ ف‬ٌّٛ‫ً ا‬١ّ‫خ رؾ‬١ٍّ‫ً ػ‬١ٙ‫ٌزغ‬

Q-What is the Spyware ?

‫ ثشاِظ اٌزغغظ ؟‬ٟ٘‫ِب‬

ANSWER

describe a wide range of programs that are designed to secretly record


and report an individual’s activities on the Internet
‫ االٔزشٔذ‬ٍٝ‫ب اٌّغزخذَ ػ‬ٙ‫َ ث‬ٛ‫م‬٠ ٟ‫غ ػٓ االٔشطخ اٌز‬١ٍ‫اٌزج‬ٚ ‫خ‬٠‫ً ثغش‬١‫ ثشاِظ طّّذ ٌزغغ‬ٟ٘

Q-What is the Web bugs ?

‫اد اٌزغغظ ؟‬ٛ‫ او‬ٟ٘‫ِب‬

ANSWER

3
@H_FLAIG
Hamad alfadhli

small images or code hidden within an email used to send back information to
the source of the bug

َ‫بٔبد اٌّغزخذ‬١‫َ ثأسعبي ث‬ٛ‫خ رم‬١ٔٚ‫خ داخً اٌشعبئً االٌىزش‬١‫ْ ِخف‬ٛ‫اد رى‬ٛ‫ع ِٓ االو‬ٛٔ ٚ‫شٖ ا‬١‫س طغ‬ٛ‫ ط‬ٟ٘
‫ِبرٗ ٌّظذس اٌزغغظ‬ٍٛ‫ِؼ‬

Q-What is the Computer monitoring software ?

‫رش ؟‬ٛ١‫ضح اٌىّج‬ٙ‫ ثشاِظ ِشالجخ اع‬ٟ٘‫ِب‬

ANSWER

most dangerous type of spyware that records every activity and keystroke
made on computer.

‫بص‬ٙ‫ ع‬ٍٝ‫ب اٌّغزخذَ ػ‬ٙ‫َ ث‬ٛ‫م‬٠ ‫ ػغطخ صس‬ٞ‫ ا‬ٚ‫غ االٔشطخ ا‬١ّ‫ً ع‬١‫َ ثزغغ‬ٛ‫رم‬ٚ ‫اع اٌزغغظ‬ٛٔ‫ اخطش ا‬ٟ٘
‫رش‬ٛ١‫اٌىّج‬

Q-What is the Anti-Spyware ?

‫خ ػٓ اٌزغغظ ؟‬٠‫ ثشاِظ اٌؾّب‬ٟ٘‫ِب‬

ANSWER

 –Designed to detect and remove: ِٓ ً‫ؽزف و‬ٚ ‫ ثشاِظ ِظّّخ الوزشبف‬ٟ٘


ٌٟ‫اٌزب‬

•Cookies

•Web bugs

•Monitoring software

 –Battles the threat of spyware ِٓ ‫ضح‬ٙ‫ب االع‬ٌٙ ‫زؼشع‬٠ ‫ لذ‬ٟ‫ذاد اٌز‬٠‫ذ‬ٙ‫رّٕغ اٌز‬
‫ثشاِظ اٌزغغظ‬

‫خ‬٠‫ رمذَ ثشاِظ اٌؾّب‬ٟ‫الغ ٌٍششوبد اٌز‬ٌّٛ‫سح اٌّشفمخ ثؼغ ا‬ٛ‫ اٌظ‬ٟ‫ف‬

4
@H_FLAIG
Hamad alfadhli

Q-how are Threats the computer security?

‫رش ؟‬ٛ١‫ضح اٌىّج‬ٙ‫ذد أِٓ أع‬ٙ‫ ر‬ٟ‫بء اٌز‬١‫ االش‬ٟ٘ ‫ِب‬

ANSWER

1- Criminals
2- computer crime
3- hazards

Q-What is the Computer crime?

‫خ ؟‬١ٔٚ‫ اٌغشائُ االٌىزش‬ٟ٘‫ِب‬

ANSWER

is an illegal action in which the perpetrator uses special knowledge of


computer technologies
ٖ‫ ٘ز‬ٟ‫ رغبػذٖ ف‬ٟ‫خ اٌز‬١ٔٚ‫ِبد االٌىزش‬ٍٛ‫خ ثؼغ اٌّؼ‬٠‫ب ٌذ‬ٙ‫ْ ِشرىج‬ٛ‫ى‬٠ ‫خ‬١ٔٛٔ‫ش لب‬١‫ رظشفبد غ‬ٟ٘
ُ‫اٌغشائ‬

Q-how are the Computer criminals?

‫ٓ ؟‬١١ٔٚ‫ٓ االٌىزش‬١ِ‫ِٓ ُ٘ اٌّغش‬

ANSWER

1- Employees ٓ١‫ظف‬ٌّٛ‫ثؼغ ا‬
2- Outside users ٓ١١‫ٓ اٌخبسع‬١ِ‫اٌّغزخذ‬
3- Hackers and crackers ٓ١‫اٌّخزشل‬
4- Organized crime ‫خ‬١ِ‫إٌّظّبد االعشا‬
5- Terrorists ٓ١١‫االس٘بث‬

5
@H_FLAIG
Hamad alfadhli

Q-What is the Computer Crime?

‫خ ؟‬١ٔٚ‫ اٌغشائُ االٌىزش‬ٟ٘‫ِب‬

ANSWER

1- Malicious Programs ٌٟ‫ب اٌزب‬ِٕٙٚ ‫ثشاِظ اٌؼبسح‬


 Viruses
 Worms
 Trojan horse
 Zombies
2- Denial of service (DoS) ‫خ‬١ٔٚ‫اٌؾشِبْ ِٓ اٌخذِخ االٌىزش‬
3- Internet Scams ٟٔٚ‫اٌغش االٌىزش‬
4- Rogue Wi-Fi Hotspots ‫ؼ‬٠‫ش رظش‬١‫خ ِٓ غ‬١‫اعزخذاَ اٌشجىبد اٌالعٍى‬
5- Theft ٌٟ‫ب اٌزب‬ِٕٙٚ ‫اٌغشلبد‬
 –Hardware or software ‫ اٌجشاِظ‬ٚ‫ضء ا‬ٙ‫اء ِٓ االع‬ٛ‫ع‬
 –Data ‫بٔبد‬١‫اٌج‬
 Computer time َ‫اٌزالػت ثبٌغبػبد ٌالعزخذا‬
6- Data Manipulation ‫خ‬١ٔٚ‫بٔبد االٌىزش‬١‫ اٌج‬ٟ‫اٌزالػت ف‬
 Computer Fraud ‫بي‬١‫االؽز‬
 Abuse Act ‫ء‬ٟ‫االعزخذاَ اٌغ‬

Q-What is the other Hazards on computer security ?

‫رش ؟‬ٛ١‫خ اٌىّج‬٠‫ ؽّب‬ٍٝ‫ ػ‬ٜ‫ اٌّخبؽش االخش‬ٟ٘‫ِب‬

ANSWER

1- Natural hazards ٌٟ‫ب اٌزب‬ِٕٙٚ ‫خ‬١‫ؼ‬١‫االخطبس اٌطج‬


 Fires & floods ‫اٌغشق‬ٚ ‫ك‬٠‫اٌؾش‬
 Winds ‫بػ‬٠‫اٌش‬
 Hurricanes ‫خ‬١‫ائ‬ٌٛٙ‫ش ا‬١‫االػبط‬
 Tornadoes ‫خ‬٠‫ش اٌشػذ‬١‫االػبط‬
 Earthquakes ‫اٌضالصي‬

6
@H_FLAIG
Hamad alfadhli

2- Civil strife and terrorism ‫االس٘بة‬ٚ ‫خ‬١ٍ٘‫ة اال‬ٚ‫اٌؾش‬


 –Wars ‫ة‬ٚ‫اٌؾش‬
 riots ‫اػّبي اٌشغت‬
 terrorist acts ‫االس٘بة‬

3- Technological failures ِٕٗٚ ٟٔٚ‫اٌفشً االٌىزش‬


 Voltage surge ٟ‫شثبئ‬ٙ‫ػذَ اٌضجبد اٌى‬

4- Use surge protector ‫ضح‬ٙ‫االعزخذاَ اٌّفشؽ ٌألع‬


5- Hard disk crashes ‫رؾطُ اٌمشص اٌظٍت‬
6- Human errors ‫خ‬٠‫االخطبء اٌجشش‬

Q-how you Measures to Protect Computer Security ?

‫خ ؟‬١ٔٚ‫ضح االٌىزش‬ٙ‫خ االع‬٠‫بط ؽّب‬١‫غ ل‬١‫ف رغزط‬١‫و‬

ANSWER

1- Restricting ‫ضح‬ٙ‫بد ٌالعزخذاَ االع‬١‫ذ اٌظالؽ‬١١‫رم‬


2- Encryption ‫ش‬١‫اٌزشف‬
3- Anticipation ً‫س اٌّشبو‬ٚ‫لغ ثؾذ‬ٛ‫اٌز‬
4- Preventing ‫خ‬١‫بؽ‬١‫رٌه ثأخز ٔغخ اؽز‬ٚ ‫خ‬١‫لبئ‬ٌٛ‫ٕخ ا‬٠‫اٌظب‬

Q-mention some example of Restricting Access?

‫بد ؟‬١‫ذ اٌظالؽ‬١‫اروش ثؼغ االِضٍخ ٌزم‬

ANSWER

1- Biometric scanning ‫ب‬ِٕٙٚ ‫خ‬٠ٛ١‫ضح اٌّغؼ اٌؾ‬ٙ‫اع‬

–Fingerprint scanners ‫ضح ِغؼ ثظّخ االطجغ‬ٙ‫اع‬

–Iris (eye) scanners ٓ١‫ضح ِغؼ ثظّخ اٌؼ‬ٙ‫اع‬

2- Passwords ‫خ‬٠‫االسلبَ اٌغش‬


3- Firewalls ٟٔٚ‫خ االٌىزش‬٠‫عذاس اٌؾّب‬

7
@H_FLAIG
Hamad alfadhli

Q-What is the Ethics?

‫بد ؟‬١‫ االخالل‬ٟ٘‫ِب‬

ANSWER

standards of moral conduct

ٟ‫ن االخالل‬ٍٛ‫ش ٌٍغ‬١٠‫ ِؼب‬ٟ٘

Q-What is the computer Ethics?

‫خ ؟‬١ٔٚ‫بد االٌىزش‬١‫ االخالل‬ٟ٘‫ِب‬

ANSWER

guidelines for the morally acceptable use of computers in our society


‫رش‬ٛ١‫ضح اٌىّج‬ٙ‫ اصٕبء اعزخذاَ اع‬ٟ‫ اٌزؼبًِ االخالل‬ٍٝ‫ ِجبدئ رغبػذ ػ‬ٟ٘

Q-What is the Copyright ?

‫ق اٌؾفع ؟‬ٛ‫ ؽم‬ٟ٘‫ِب‬

ANSWER
a legal concept that gives content creators the right to control use and
distribution of their work
ٟٔٚ‫غ ِٕزغٗ االٌىزش‬٠‫ص‬ٛ‫ر‬ٚ َ‫ اعزخذا‬ٟ‫ اٌزؾىُ ف‬ٟ‫ ف‬ٍٟ‫خ رغّؼ ٌٍّبٌه االط‬١ٔٛٔ‫ؽ لب‬ٚ‫ شش‬ٟ٘

Q-What is the Software piracy?

‫ لشطٕخ اٌجشاِظ ؟‬ٟ٘‫ِب‬

8
@H_FLAIG
Hamad alfadhli

ANSWER

the unauthorized copying and distribution of software


‫ب‬ٙٔٛ‫ٍّى‬٠ ‫ش ِظشػ ٌٗ ٌٍجشاِظ ِٓ لجً اشخبص ال‬١‫إٌشش اٌغ‬ٚ ‫ إٌغخ‬ٟ٘

Q-What is the Plagiarism?

‫ش٘ب ؟‬١‫ غ‬ٚ‫خ ا‬١‫ االٔزؾبي ٌٍشخظ‬ٛ٘‫ِب‬

ANSWER
representing some other person’s work and ideas as your own without
giving a credit to the original source
‫ ٌٍفىشح‬ٟ‫غ‬١‫ روش اٌّظذس اٌشئ‬ٚ‫افمخ ا‬ِٛ ‫ش اخز‬١‫ افىبسُ٘ ٌشخض ِٓ غ‬ٚ‫ٓ ا‬٠‫ ٔغت اػّبي االخش‬ٛ٘
ٌٗ ٍّٟ‫اٌؾك اٌؼ‬ٚ
‫االخزظبساد ٌـ‬CHAPTER 01
‫االختصار‬ ‫المعنى‬
DoS Denial of service

‫جل ما اطلبه الدعاء لصاحب هذه العمل ومن ال يريد الدعاء فأنا ابيحه منه‬

You might also like