Computer Ethics: Security, Privacy, and Best Practices
Computer Ethics
Moral guidelines that govern the use of computers and information systems. For example, it involves the unauthorized use of computers and networks, software theft, information accuracy, codes of conduct, and information privacy.
Encryption and 3 Encryption Methods
Encryption safeguards against information theft. It is the process of converting plaintext (readable data) into ciphertext (unreadable characters) through an encryption key (the formula) that often uses more than one method. To read the data, the recipient must decrypt or decipher the data.
Methods:
- Transposition
- Substitution
- Expansion
- Compaction
Differentiate between:
Hardware theft – Hardware theft is the act of stealing computer equipment, e.g., cables used to lock equipment. Some notebook computers use passwords, possessed objects (tokens/cards), and biometrics as security methods.
Hardware vandalism – Is the act of defacing or destroying any computer equipment.
Methods to Protect Systems from Hackers
- Intrusion Detection Software (IDS)
- Access Control
- Audit Trail
- Encryption
- Personal Firewall
- Sign up for email filtering through your Internet service provider or use an anti-spam program such as Brightmail.
- Surf the Web anonymously with a program such as Freedom Web Secure or through an anonymous Web site such as Anonymizer.com.
Software Theft and Prevention Methods
The act of stealing or illegally copying software or intentionally erasing programs.
Methods: Product activation allows the user to input a product identification number online or by phone and receive a unique installation identification number.
Advantages of Biometric Technology
Why is biometric technology better than possessed objects?
Objects can be stolen, misplaced, and could fall into the wrong hands, whereas biometric technology poses fewer risks as it is much more difficult to copy or impersonate another person’s biometric details. Examples include:
- Voice verification system: Compares live speech with a stored voice pattern.
- Signature verification system: Recognizes shapes of a signature.
- Iris recognition system: Reads patterns in blood vessels in the back of the eyes.
IT Code of Conduct
Written guidelines that determine if a computer action is ethical.
Examples:
- Computers must not be used to harm anyone.
- All information received will be treated with strict confidence.
Challenges of Information Privacy
- It is difficult to maintain today because data is stored online.
- Monitoring of employees is difficult.
What are Computer Ethics?
- Unauthorized use of computers and networks.
- Moral guidelines that govern the use of computers and information systems.
- Information accuracy.
Securing a Website
Hardware theft is:
- The act of stealing computer equipment.
- The act of defacing or destroying computer equipment.
- Unauthorized copying or distribution of copyrighted software.
- Stealing and using information about others.