Comp Literacy - Chapter 6 Computer Ethic and Security
Comp Literacy - Chapter 6 Computer Ethic and Security
LITERACY
(FSPK0012)
UTM Foundation
CHAPTER 6
Computer Ethic and
Security
by:
Dr. Siti Hajar Othman &
Dr. Nazmona Mat Ali
Faculty of Computing,
UTM Johor Bharu
Email: [email protected] / [email protected]
Phone: 07-55 32372 /
Website: comp.utm.my/hajar & comp.utm.my/nazmona
Table of Content: CHAPTER 6
1) Computer Ethics
2) Intellectual Property
3) Computer Security
4) Computer Security Risks
5) Security Measure
2
INTRODUCTION
3
What Is Security?
SECURITY
Security is defined as “the quality or state of
being secure—to be free from danger”
Security is often achieved by means of several
strategies undertaken simultaneously or used in
combination with one another
INFORMATION SECURITY
The protection of information and its critical
elements (confidentiality, integrity and
availability), including the systems and hardware
that use, store, and transmit that information
Through the application of policy, technology, and
training and awareness programs
6
Basic Rules of Computer Ethics
7
Rules or precautions
in the Computer Room
1) No noise making is allowed
2) Acts of vandalism such as fighting should be avoided
3) Burglary alarms should be installed in the computer room
4) Always switch off all electrical appliances after use and
shut down computers after use
5) Prevention of unauthorized access to
the computers
6) No eating or drinking in the computer room
7) Leave all hardware and furniture in their
original place
8) Do not bring in any sharp objects to the
computer room.
8
2) Intellectual Property (IP)
9
2) Intellectual Property (IP)
Type of
Examples of intellectual property
protection
Trade marks Product names, logos, jingles
Appearance of a product including, shape, packaging,
Registered designs
patterns, colours, decoration
Inventions and products, eg machines and machine parts,
Patents
tools, medicines
Example: Software
- Software is a product of human intellect -> a kind of IP
- e.g.: Adobe, the Adobe logo, Windows and etc.
10
2) Intellectual Property (IP)
11
3) Computer Security
12
Computer Crime
14
4) Computer Security Risks
15
MANAGING COMPUTER SECURITY ???
16
5) Security Measures
Restricting access
Encrypting data
Anticipating disasters
Preventing data loss
17
Restricting Access
Biometric scanning
Fingerprint scanners
Iris (eye) scanners
Passwords
Firewalls
Encrypting Data
Thank You
21