Professional Documents
Culture Documents
• Procedural Errors
• Software Errors
• "Dirty Data " Problems
• Electromechanical Problems
• Natural Hazards
• Computer Crimes
Human Errors
Human Errors
Is a label given to an
action that has negative
consequences or fails to
achieve the desired
outcome
Procedural Errors:
04
05 SOFTWARE BUGS
Software Errors:
06
ALSO KNOWN AS
"CYBERCRIME" , THE USE OF TWO TYPES:
A COMPUTER AS AN
INSTRUMENT TO FURTHER *ILLEGAL ACT PERPETRATED
ILLEGAL ENDS AGAINST COMPUTERS OR
TELECOMMUNICATIONS
*USE OF COMPUTERS OR
TELECOMMUNICATIONS TO
ACCOMPLISH AN ILLEGAL ACT
10
Security
5.2
Security Safeguards; Protecting
Computer and Communications
Computer Security can be Divided into
Five Components
• DETERRENTS TO COMPUTER CRIME 2. IDENTIFICATION AND
ACCESS
-enforcing the law
-CERT: The Computer Emergency Response - very legitimate right access by
Team what you have, what you know,
• provide round the clock informatin on and who you are
international computer security threats
• what you have; like keys,
-Tools Used to Fight Fraudulent and cards, signatures, badges
Unauthorized Online Uses • what you know; like pin
• rule base detection software numbers and password
• predictive statistical model software • who you are like; bio metrics
• employee internnet management such as face scan and figer
• internet browisng filtering software print scan
• elctronic surveillance
3. ENCRYPTION 4. PROTECTION OF 5. DISASTER RECOVERY
SOFTWARE AND DATA PLAN
-the process of altering and
changing a data unto -restrict access to online files; • Method of restoring information-
unreadable form to prevent use transaction logs processing operations that have
unauthorized access -use audit controls to track who been halted by destruction or
used what programs and accident
• Advantage: encrypting data servers; which files were opened • Back up everything; put
that is available over the mainframes in different locatio
and so on
Internet keeps thieves and
-use people controls-screen
crackers from reading it.
applicants; do background
• Disadvantage: encrypting
checks; monitor internet, email,
data may prevent law-
and computer usage; use
enforcement officials from
shredders for discarded
reading the data criminals
documents and materials.
are sending to one another.
5.3 Explain Privacy Surveillance: Data
Collections and Spies
Privacy Surveillance
clear out your cookie caches - a virtual private network is a • using 2FA creates an additional
and browser histories, and way to create a secure tunnel step to access your accounts and
when you visit a website, make through the inherently insecure data.
sure HTTPS is enabled. internet. • the most common methods are
via an SMS message, a biometric
Search Engines: marker such as a figerprint or iris
Passwords and Vaults
there are engines like scan or a PIN
-using complex passwords is the
DuckDuckGo and Qwant that first line of defense you have to SECURE YOUR MOBILE DEVICES
don't record your search history secure your online accounts. • PATCH
and block ad trackers.
these patches resolve new bugs
-password vaults generate and flaws, as well as sometimes
Use some of these browser
strong passwords on your provide performance fixes.
pugins: • LOCK IT DOWN
behalf, as well as proactively
HTTPS Everywhere, Facebook make sure your mobile device is
change old and weak ones.
Container, Disconnect, Blur, or locked in some way to prevent its
Privacy Badger. physical compromise.
ENCRYPT YOUR MESSAGES MOBILE APPLICATIONS REDUCE YOUR ONLINE
SOURCES AND FOOTPRINT
• SIGNAL
PERMISSIONS
the most accessible, secure messaging
service in existence today. -downloading apps from trusted • HavelBeenPwned
• WhatsApp sources such as Google Play and - use the HavelBeenPwned
it completed a rollout of end-to-end Apple's App store is always the service to check if you have been
encryption across all compatible devices in best option. compromised in a large data breach.
2016. -remember that apps can request a variety of permissions that can
19
The Internet of Things
THANK YOU!!!
I'll catch you online!