Sunday, May 16, 2010

Computer Security Ethics and Privacy

By: Nicholas Tan




Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse. For example, it is crucial for businesses to keep information they have secure so that hackers can’t access the information. Home users also need to take means to make sure that their credit card numbers are secure when they are participating in online transactions. A computer security risk is any action that could cause lost of information, software, data, processing incompatibilities, or cause damage to computer hardware, a lot of these are planned to do damage. An intentional breach in computer security is known as a computer crime which is slightly different from a cypercrime. A cybercrime is known as illegal acts based on the internet and is one of the FBI’s top priorities. There are several distinct categories for people that cause cybercrimes, and they are refereed as hacker, cracker, cyberterrorist, cyberextortionist, unethical employee, script kiddie and corporate spy. The term hacker was actually known as a good word but now it has a very negative view. A hacker is defined as someone who accesses a computer or computer network unlawfully. They often claim that they do this to find leaks in the security of a network. The term cracker has never been associated with something positive this refers to someone how intentionally access a computer or computer network for evil reasons. It’s basically an evil hacker. They access it with the intent of destroying, or stealing information. Both crackers and hackers are very advanced with network skills. A cyberterrorist is someone who uses a computer network or the internet to destroy computers for political reasons. It’s just like a regular terrorist attack because it requires highly skilled individuals, millions of dollars to implement, and years of planning. The term cyperextortionist is someone who uses emails as an offensive force. They would usually send a company a very threatening email stating that they will release some confidential information, exploit a security leak, or launch an attack that will harm a company’s network. They will request a paid amount to not proceed sort of like black mailing in a since. An unethical employee is an employee that illegally accesses their company’s network for numerous reasons. One could be the money they can get from selling top secret information, or some may be bitter and want revenge. A script kiddie is someone who is like a cracker because they may have the intentions of doing harm, but they usually lack the technical skills. They are usually silly teenagers that use prewritten hacking and cracking programs. A corporate spy has extremely high computer and network skills and is hired to break into a specific computer or computer network to steal or delete data and information. Shady companies hire these type people in a practice known as corporate espionage. They do this to gain an advantage over their competition an illegal practice. Business and home users must do their best to protect or safeguard their computers from security risks. The next part of this article will give some pointers to help protect your computer. However, one must remember that there is no one hundred percent guarantee way to protect your computer so becoming more knowledgeable about them is a must during these days. When you transfer information over a network it has a high security risk compared to information transmitted in a business network because the administrators usually take some extreme measures to help protect against security risks. Over the internet there is no powerful administrator which makes the risk a lot higher. If your not sure if your computer is vulnerable to a computer risk than you can always use some-type of online security service which is a website that checks your computer for email and Internet vulnerabilities. The company will then give some pointers on how to correct these vulnerabilities. The Computer Emergency Response Team Coordination Center is a place that can do this. The typical network attacks that puts computers at risk includes viruses, worms, spoofing, Trojan horses, and denial of service attacks. Every unprotected computer is vulnerable to a computer virus which is a potentially harming computer program that infects a computer negatively and altering the way the computer operates without the user’s consent. Once the virus is in the computer it can spread throughout infecting other files and potentially damaging the operating system itself. It’s similar to a bacteria virus that infects humans because it gets into the body through small openings and can spread to other parts of the body and can cause some damage. The similarity is, the best way to avoid is preparation. A computer worm is a program that repeatedly copies itself and is very similar to a computer virus. However the difference is that a virus needs o attach itself to an executable file and become a part of it. A computer worm doesn’t need to do that I seems copies to itself and to other networks and eats up a lot of bandwidth. A Trojan Horse named after the famous Greek myth and is used to describe a program that secretly hides and actually looks like a legitimate program but is a fake. A certain action usually triggers the Trojan horse, and unlike viruses and worms they don’t replicate itself. Computer viruses, worms, and Trojan horses are all classifies as malicious-logic programs which are just programs that deliberately harms a computer. Although these are the common three there are many more variations and it would be almost impossible to list them. You know when a computer is infected by a virus, worm, or Trojan horse if one or more of these acts happen:





Screen shots of weird messages or pictures appear.


You have less available memory then you expected


Music or sounds plays randomly.


Files get corrupted


Programs are files don’t work properly


Unknown files or programs randomly appear


System properties fluctuate





Computer viruses, worms, and Trojan horses deliver their payload or instructions through four common ways. One, when an individual runs an infected program so if you download a lot of things you should always scan the files before executing, especially executable files. Second, is when an individual runs an infected program. Third, is when an individual bots a computer with an infected drive, so that’s why it’s important to not leave media files in your computer when you shut it down. Fourth is when it connects an unprotected computer to a network. Today, a very common way that people get a computer virus, worm, or Trojan horse is when they open up an infected file through an email attachment. There are literally thousands of computer malicious logic programs and new one comes out by the numbers so that’s why it’s important to keep up to date with new ones that come out each day. Many websites keep track of this. There is no known method for completely protecting a computer or computer network from computer viruses, worms, and Trojan horses, but people can take several precautions to significantly reduce their chances of being infected by one of those malicious programs. Whenever you start a computer you should have no removable media in he drives. This goes for CD, DVD, and floppy disks. When the computer starts up it tries to execute a bot sector on the drives and even if it’s unsuccessful any given various on the bot sector can infect the computer’s hard disk. If you must start the computer for a particular reason, such as the hard disk fails and you are trying to reformat the drive make sure that the disk is not infected.



About the Author


Submit your articles and get a PR4 backlink to your website! Submit Articles! We provide free articles and information. Check us out at Free Articles!

(ArticlesBase SC #302878)


Article Source: http://www.articlesbase.com/ - Computer Security Ethics and Privacy






Related Articles:


Computer Security Computer Security Ethics And Privacy

Today, many people rely on computers to do homework, work, and create or store useful information. Therefore, it is important for the information on the computer to be stored and kept properly. It is also extremely important for people on computers to protect their computer from data loss, misuse, and abuse...



Protect your Computer and Internet Privacy

Is a known fact that every time you open abrowser to view a web page, order something online, orIs a known fact that every time you open aread your email in a web based viewer that informationIs a known fact that every time you open ais stored on your computer for later use. Whether you...



Protect Your Computer System With A Comprehensive Security Policy

The most difficult part of creating a Security Policy for your business is determining what, exactly, to include in it. Never heard of a Security Policy before? You’re not alone. But whether you are the only employee in your company or you have a small staff working for you, you need to learn what a Security Policy is, and then you need to create one...



Security necessities to prevent your computer from Spyware

In the internet world it is vital for users to have a good spyware scan and removal tool because of the multitude of different spyware, adware, Trojans and other malware constantly looking to attack your system. Many spyware tools available are free and those up for purchase typically do not exceed $30 to $40. Anti-spyware tools will greatly assist in protecting your privacy and restoring full computer functions that spyware may have taken over...



Enhance your Computer Skills with great Computer Tips and Security Info

The use of computer is no longer limited to e-mails and chats. Each day new computer software are coming up which is making the use of computer and internet more easy and accessible. Even the existent software like Window XP and Windows Vista are adding new and enticing features every day...



Computer Security Watch Your Web Browser

Your web browser is your means of getting around the Internet. From checking your webmail to booking your holiday online the web browser does it all. Without it accessing and viewing the Internet would be almost impossible...



WHY CONSULTANTS DONT TELL ABOUT COMPUTER SECURITY

Copyright 07-2004 by Gina NovelleMost people refuse to believe they need it. After all, their computer is in their office or home and only turned on by them. They no longer use diskettes and their e-mail is checked with the latest and greatest virus checker...



YOUR PRIVACY EXPOSED Computer Forensics International uncovers secrets about recycled hard drives

FOR IMMEDIATE RELEASE Contact: Stacey Kumagai, Media RelationsPhone: 818/506-8675; Email: mediamonster@yahoo.com YOUR PRIVACY EXPOSED! Computer Forensics International uncovers secrets about recycled hard drives Los Angeles, CA --- Privacy is essential in both personal and professional business. But recently, privately held computer evidence recovery firm, Computer Forensics International (CFI) President, Mark McLaughlin & staff discovered a nationwide pattern of privacy violations found on recycled hard drives randomly purchased from major metropolitan thrift stores and on the Internet...



Laptop Security Do Not Panic If You Lost Your Computer

By Maya Lem...



How Remove Spyware Removal Guide For Increased Computer Security

Spyware is a type of software that gets installed on your computer that collects information about you and your computer habits and sends this information back to its masters. The most malicious of these programs will actually steal important personal information like passwords, credit card numbers, financial information, and anything else that may be stored on your computer. If this sounds scary and you want to do something about it it is time to learn the ins and outs of how remove spyware...

Most Recent News





More Related Articles


Get Antivirus Security for Your Computer

Computer viruses are malicious enough to spoil your years work. If you are among those who require being online for various purposes, whether work or fun, your computer is at risk of being attacked by numerous viruses roaming in cyberspace. So, guard your system against pesky malware with the help of an effective antivirus security...



Important Computer and Internet Security Issues You Need to be Aware Of

If you're looking for a business opportunity, it may be already right there in your home -- your computer and an Internet connection. Don't worry about raising capital; you actually only need very little (or even none at all) to get started on an online business. All you really need is a good Internet connection and a computer; you can be well on your way to making a nice side income or full income every month depending on how you decide to pursue your online business...



Computer Dreams Digital Security





What Is Computer Security System





What Is Computer Security





What Are The Most Popular Computer Security Software

With the increasing threat to computer security everybody now-a-days is concerned and is taking steps to counter the attacks on their machine and keep it safe. It is ironical that people are using computer security software like anti-viruses, etc for keeping their computer software like operating system, etc safe. Many newly discovered spywares and malwares and attacking systems through internet...



How can you ensure computer security

Varied computer systems require different levels of computer security, as the level of privacy or protection needed is going to vary significantly. Computer systems under government control, for example, require a much higher level of security than computers used by students in a university setting. The level of required computer security, then, along with what forms of security are implemented, are going to vary significantly as well...



Computer Security Made Easy

As more and more people begin to use the internet, be it for communication, online banking, investment or shopping, the potential danger of hackers and malicious attackers increase. While some may simply be after information for phishing or identity resale purposes, others are more dangerous, looking for computers to use to launch attacks such as the infamous Denial of Service or other viruses or trojans at other unknowing targets. The list below contains some easy, cheap methods to make your computer secure...


No comments:

Post a Comment