Computer Security Ethics and Privacy Overview

Share

Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse.  For example, it is crucial for businesses to keep information they have secure so that hackers can’t access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions.

 A computer security risk is any action that could cause lost of information, software, data, processing incompatibilities, or cause damage to computer hardware,   a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cypercrime. A cybercrime is known as illegal acts based on the internet and is one of the FBI’s top priorities.  There are several distinct categories for people that cause cybercrimes, and they are refereed as hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy.  The term hacker was actually known as a good word but now it has a very negative view.

Over the internet there is no powerful administrator which makes the risk a lot higher. If your not sure if your computer is vulnerable to a computer risk than you can always use some-type of online security service which is a website that checks your computer for email and Internet vulnerabilities. The company will then give some pointers on how to correct these vulnerabilities.  The Computer Emergency Response Team Coordination Center is a place that can do this. The typical network attacks that puts computers at risk includes viruses, worms, spoofing, Trojan horses, and denial of service attacks.

Every unprotected computer is vulnerable to a computer virus which is a potentially harming computer program that infects a computer negatively and altering the way the computer operates without the user’s consent. Once the virus is in the computer it can spread throughout infecting other files and potentially damaging the operating system itself. It’s similar to a bacteria virus that infects humans because it gets into the body through small openings and can spread to other parts of the body and can cause some damage. The similarity is, the best way to avoid is preparation.  A computer worm is a program that repeatedly copies itself and is very similar to a computer virus. However the difference is that a virus needs o attach itself to an executable file and become a part of it. A computer worm doesn’t need to do that I seems copies to itself and to other networks and eats up a lot of bandwidth. A Trojan horse named after the famous Greek myth and is used to describe a program that secretly hides and actually looks like a legitimate program but is a fake.  A certain action usually triggers the Trojan horse, and unlike viruses and worms they don’t replicate themselves. Computer viruses, worms, and Trojan horses are all classifies as malicious-logic programs which are just programs that deliberately harms a computer.  Although these are the common three there are many more variations and it would be almost impossible to list them.

You know when a computer is infected by a virus, worm, or Trojan horse if one or more of these acts happen: screen shots of weird messages or pictures appear, you have less available memory then you expected, music or sounds plays randomly, files are corrupted, programs are files don’t work properly, unknown files or programs randomly appear or system properties fluctuate.

Computer viruses, worms, and Trojan horses deliver their payload or instructions through four common ways:

One, when an individual runs an infected program so if you download a lot of things you should always scan the files before executing, especially executable files.  Second, is when an individual runs an infected program.  Third, is when an individual bots a computer with an infected drive, so that’s why it’s important to not leave media files in your computer when you shut it down.   Fourth -when it connects an unprotected computer to a network.

Today, a very common way that people get a computer virus, worm, or Trojan horse is when they open up an infected file through an email attachment. There are literally thousands of computer malicious logic programs and new one comes out by the numbers so that’s why it’s important to keep up to date with new ones that come out each day. Many websites keep track of this. There is no known method for completely protecting a computer or computer network from computer viruses, worms, and Trojan horses, but people can take several precautions to significantly reduce their chances of being infected by one of those malicious programs.

Whenever you start a computer you should have no removable media in he drives. This goes for CD, DVD, and floppy disks. When the computer starts up it tries to execute a bot sector on the drives and even if it’s unsuccessful any given various on the bot sector can infect the computer’s hard disk. If you must start the computer for a particular reason, such as the hard disk fails and you are trying to reformat the drive make sure that the disk is not infected.

Tags: 
Subscribe to Comments RSS Feed in this post

21 Responses

  1. There are always risks with technologies.

  2. I shop online only from well-known sites. This way I hope my personal and financial data is protected.

  3. Protecting the computer’s data is not an easy task.

  4. Thank you for the auspicious writeup. It in fact was a amusement account it. Look advanced to far added agreeable from you! However, how can we communicate?

  5. I am so happy to read this. This is the kind of manual that needs to be given and not the accidental misinformation that’s at the other blogs. Appreciate your sharing this best doc.

  6. Simply wanna remark on few general things, The website design and style is perfect, the content material is really great : D.

  7. you’re in point of fact a excellent webmaster. The website loading speed is incredible. It seems that you’re doing any distinctive trick. Moreover, The contents are masterpiece. you have done a excellent task in this subject!

  8. High quality put up, We are browsing back again on a regular basis to look around for fresh news.

  9. Valuable information. Lucky me I discovered your website by accident, and I am surprised why this twist of fate did not came about in advance! I bookmarked it.

  10. Merely wanna comment on few general things, The website style and design is perfect, the written content is very wonderful. “I have seen the future and it doesn’t work.” by Robert Fulford.

  11. Hi this is somewhat of off topic but I was wondering if blogs use WYSIWYG editors or if you have to manually code with HTML. I’m starting a blog soon but have no coding expertise so I wanted to get guidance from someone with experience. Any help would be greatly appreciated!

  12. Keep up the good work , I read few posts on this site and I conceive that your web site is rattling interesting and has sets of great info .

  13. I like the valuable details you give within your articles. I’ll bookmark your weblog and check once again here regularly. I’m quite certain I’ll learn plenty of new stuff correct here! Greatest of luck for the next!

  14. Good day! Do you know if they make any plugins to protect against hackers? I’m kinda paranoid about losing everything I’ve worked hard on. Any recommendations?

    • Probably it is useful to make backup copies of your content regularly. You may ask a professional in addition.
      Thank you for writing,
      Nelly

Pingbacks/Trackbacks

Leave a Reply

Your email address will not be published. Required fields are marked *

*
*