Professional Documents
Culture Documents
Keeping data safe is extremely important for a number of reasons. Data can be corrupted or
deleted either through accidental damage or through a malicious act. There are many ways to
keep data safe and some of the methods available will be covered in this chapter.
-the network/server will come to a halt/stop trying to deal with all the traffic/requests
2. Viruses
-designed to amend/delete/copy data and files on a user’s computer without their consent
3. Hacking/Cracking
4. Phishing
-in the hope of gathering personal and financial data from the recipient
5. Pharming
6. Spyware
7. Spam
COOKIES
Definition
-Stored by a browser
-Detected by the website when it is visited again
Use
DATA LOSS
-to avoid this use backups, save data regularly and use passwords to restrict unauthorized users.
-It is used to protect sensitive information so that only authorized parties can view it.
-There are two types of Encryptions symmetric (private key), asymmetric (private, public key)
-decrypt the cipher text on the other end to receive the original message
-Used for Online banking, Online shopping, Email, Cloud based storage, Intranet /extranet.
Stages through which a user accesses a secured website with SSL deployed
OR
- the web browser attempts to connect to a web site which is secured by SSL
- the web server sends the web browser a copy of its SSL certificate
- if it is then the web browser sends a message back to the web server
- the web server will send back acknowledgement the SSL encrypted session to begin
- the encrypted data is then shared securely between web browser and server
-Used for Online banking, Online shopping, Email, Cloud based storage, Intranet/extranet
4. Firewall
-checks whether incoming and outgoing traffic meets a given set of criteria/rules
5. Proxy Server
-Prevents direct access to the webserver, sits between user and webserver
-can be used to help prevent DDOS (Distributed Denial of Service) hacking of webserver
-If traffic is valid the data from the webserver will be obtained by the user
7. Anti-Virus software
-Locked doors / cctv timeout / auto log off, to help prevent unauthorized access
-Maintain a hierarchy of levels of users, each having different levels of access e.g. admin,
employee, and guest
Biometric password
COMPUTER ETHICS
-We should follow codes of practice for creation of code e.g. ACM/IEEE
Plagiarism:
Copyright:
-To determine whether, and under what conditions, this original work may be used by others
Free Software:
-It’s a software that allows a person to share, copy and change software freely
-Users have the freedom to pass on the software to friends and family as they wish.
Freeware:
-Freeware differs from free software, as the latter allows a user to modify source code for
republishing or integration with other software
Shareware:
-Software that has a license allowing free use for a trial period
-Freeware needs owner’s permission to share/amend while free software doesn’t need it
-Freeware’s owner retains copyright whereas free software’s owner releases copyright
-Freeware’s additional features may not be free where as Free Software is totally free
-Freeware is distributed without the source code but free software includes the source code
-Freeware can be restricted in use e.g. non-commercial whereas free software can be used
without restriction