Professional Documents
Culture Documents
Foundation In Science
2021/07
FSC 1123
INTRODUCTION TO INFORMATION SYSTEM &
TECHNOLOGY
Lecture Units
2 hours lecture class + 1 tutorial lesson
UNIT 1: Introduction to Information System
UNIT 2: Computer Hardware
UNIT 3: Computer Software
UNIT 4: Telecommunications and Network
UNIT 5: Computer Security, Safety and Ethical
UNIT 6: Information Systems Strategy
UNIT 7: Information System Development
UNIT 8: Electronic and Mobile Commerce
UNIT 9: Enterprise System: Transaction Processing System
UNIT 10: Enterprise System: Decision Support Systems (DSS)
UNIT 11: Knowledge Management Systems (KMS)
Unit 5 : Computer Security, Safety and Ethical
5.1 Digital Security Risk
Event or action that could cause loss of or damage to computer or
mobile device hardware, software, data, information or processing
capability.
Common digital security risk;
Internet and network attacks – virus attack
System failure – lightning strike
Information theft – stolen identity
Software theft – illegal copy
Hardware theft – stolen computer
Unauthorized access and use – intercepting wireless communication
Unit 5 : Computer Security, Safety and Ethical
5.1 Digital Security Risk
Perpetrators of cybercrime;
Perpetrators of cybercrime;
Perpetrators of cybercrime;
o Back doors
o Spoofing
Unit 5 : Computer Security, Safety and Ethical
5.2 Internet and Network Attacks
o Malware (malicious software)
Consists of programs that act without a user’s knowledge and alter the
operation of computers and mobile devices.
Deliver its destructive event or prank on a computer in variety ways.
(Users open an infected file, runs an infected program, connects an
unprotected computer to a network, or when a certain condition or event
occurs, such as the computer clock changing to a specific date)
(Common way – infected by virus is through users opening infected email
attachments)
Unit 5 : Computer Security, Safety and Ethical
5.2 Internet and Network Attacks
o Malware (malicious software)
Common types ;
Virus - Affects a computer negatively by altering the way the computer works
Worm - Program that copies itself repeatedly, for example in memory or on a network, using
up resource and possibly shutting down the computer device or network
Trojan horse - Program that hides within or looks like a legitimate program.Does not replica
itself to other computer or devices
Rootkit
Spyware
Adware
Unit 5 : Computer Security, Safety and Ethical
5.2 Internet and Network Attacks
o Malware (malicious software)
Common types ;
Rootkit - Program that hides in a computer and allows someone from a remote
location to take full control
Spyware - Program placed on a computer or mobile device without the user’s
knowledge that secretly collects information about the user and then
communicates the information it collects to some outside source while the user
is online
Adware - Program that display an online advertisement in a banner, pop-up
window, or pop-under window on webpages, email messages, or other Internet
services.
Unit 5 : Computer Security, Safety and Ethical
5.2 Internet and Network Attacks
Intellectual
Information Codes of
property
accuracy conducts
rights
Green Information
computing privacy
Unit 5 : Computer Security, Safety and Ethical
5.9 Cookies
• A cookie is a small text file that a Web server stores on your computer.
Assist with
Allow for Store users’
online
personalization passwords
shopping
Track how
Target
often users
advertisements
visit a site
End of Unit 5 : Computer Security, Safety and Ethical