You are on page 1of 14

CS – 1B

Office Productivity Tools


Hello!
I am Imee U. Anton
Also known as “maam ai” by my colleagues
I am your Instructor for this subject

2
Computer Security,
Ethics and Privacy

3

Ever wonder how secured are you on the online world?

4
○ Privacy – What are the threats to personal privacy and how can we protect ourselves?
-the state or condition of being free from being observed or disturbed by other people.

○ Security – How can access to sensitive information be controlled and how can we secure
hardware and software?
-the state of being free from danger or threat.

○ Ethics – How do the actions of individual users and companies affect society?
-is a system of moral principles

5
Computer security risk

It is any event or action that could cause a loss of or damage to


computer hardware, software, data, information, or processing
capability.

6
Malicious software (Malware)
-software that is specifically designed to disrupt, damage, or gain unauthorized access
History
to a computer system. of Computers

Click the link below: (types of malware)


https://www.youtube.com/watch?v=JZOLa7_LShk
7
Infected computers can suffer from one or more of the following
symptoms:

• OS running slower
• Less available memory
• Corrupted files
• Unusual messages or images
• Unusual sounds playing
• Existing programs and files disappear
• Programs or files not working properly
• Unusual programs or files appear
• OS does not start up or unexpectedly shuts down

8
Basic security practices

• Lock your device


• Avoid insecure platforms, applications
• Use official email addresses
• Be wary of free services
• Don’t share information outside official channels.
• Promote a culture of security and privacy.
• Use built-in Data encryption (ex. Bitlocker)

9
Security tools
• Access control
• Anti-malware software
• Anomaly detection
• Application security
• Data loss prevent (DLP)
• Email security
• Endpoint security
• Firewall
• Intrusion prevention systems
• Network segmentation
• Security information and event management (SIEM)
• Virtual private network (VPN)
• Web security
• Wireless security
10
DATA PROTECTION PRINCIPLES

11
Digital Certificates
• A digital certificate is a notice that guarantees a user or a Web site is legitimate.
• A certificate authority (CA) is an authorized person or company that issues and
verifies digital certificates.

12
Republic act 10175
“Cyber crime prevention act of 2012”
• AN ACT DEFINING CYBERCRIME, PROVIDING FOR THE PREVENTION,
INVESTIGATION, SUPPRESSION AND THE IMPOSITION OF PENALTIES
THEREFOR AND FOR OTHER PURPOSES.

• It aims to address legal issues concerning


online interactions and the Internet in the
Philippines.

13
○ BE SAFE
CYBER SAFETY
○ DO NOT CREATE, STORE OR DISTRIBUTE FILES THAT ARE OFFENSIVE
○ DO NOT PUT PERSONAL/PRIVATE DETAILS INTO ANY PLATFORM
○ BE RESPONSIBLE

14

You might also like