Professional Documents
Culture Documents
A
C
I
H
T
E
R
COMPUTE
S
R
E
S
U
G
N
O
M
A
S
E
U
S
IS
SUE,
IS
S
IC
H
T
E
R
E
T
U
P
M
O
C
,
S
THIC
E
R
E
T
U
P
M
O
C
O
T
N
IO
T
C
U
Y,
C
INTROD
A
IV
R
P
,
L
A
IC
S
Y
H
P
&
L
A
GIC
LO
:
Y
IT
R
U
C
E
S
,
N
IO
T
A
IC
IF
S
USERS CLAS
ETHICS
Computer ethics is set of moral principles that regulate the use of computers
Log-in to computer using someone else id and password and read her/his personal data
What is privacy?
What is security?
In information technology, security is the protection of information assets through the use of technology,
processes, and training.
Two kinds of hackers, "white hat" hackers and "black hat" hackers
Disruption of service or the gaining of proprietary or personal information from the network
White hat hackers are hired by businesses to test internal computer systems in order to determine its integrity and
whether or not there are vulnerable points of entry for outsiders. white hat hackers therefore use their powers for
good, and can also create new and useful software.
cyber-stalking is intimidation through the use of electronic means, such as email, online
Computer Theft
Is defined as the unauthorized used of another persons property such as get online material
with no cost
is the crime of obtaining money by deceiving (to trick) people through the use of computers
such as email hoaxes, program fraud, investment schemes and claim of expertise on certain
fields
Copyright infringement
is
a violation of the rights secured by a copyright. it occurs when you break the copyright laws
such as copying movie, software or cds illegally
Authentication
User Identification
Possessed Object
Biometric Device
Cyber law
Logical security
Logical security refers to the process of using software-based techniques for authenticating a
The protection of personnel, hardware, programs, networks, and data from physical
circumstances and events that could cause serious losses or damage to an enterprise,
agency, or institution.
Example:
Anti-theft cabling (i.e., an alarm sounds when any piece of equipment is disconnected from
the system)
ACTIVITY - 3
IN THE SAME GROUP: