Friday, December 6, 2019

Personal Code Of Ethics Essay Example For Students

Personal Code Of Ethics Essay 1. What Are the Various Types of Security Risks that Can Threaten Computers?A computer security risk is any event or action that could cause a loss of or damage to computerhardware, software data, information, or processing capability. Computer security risks includecomputer viruses, unauthorized access and use, hardware theft, software theft, information theft, andsystem failure. Safeguards are protective measures that can be taken to minimize or prevent theconsequences of computer security risks. A computer virus is a potentially damaging computerprogram designed to affect or infect a computer negatively by altering the way it works. Unauthorized access is the use of a computer or network without permission; unauthorized use isthe use of a computer or its data for unapproved or possibly illegal activities. An individual who triesto access a computer or network illegally is called a cracker or a hacker. Hardware theft,software theft, and information theft present difficult security challenges. The most common formof software theft is software piracy, which is the unauthorized and illegal duplication of copyrightedsoftware. A system failure is the prolonged malfunction of a computer. 2. How Does a Computer Virus Work and What Steps CanIndividuals Take to Prevent Viruses?A virus spreads when users share the host program to which the virus is attached. A virus canreplace the boot program with an infected version (boot sector virus), attach itself to a file (filevirus), hide within a legitimate program (Trojan horse virus), or use an applications macrolanguage to hide virus code (macro virus). The virus is activated when a certain action takes place(a logic bomb) or at a specific time (a time bomb). Viruses can be prevented by installing anantivirus program, write-protecting a rescue disk or emergency disk, never starting a computerwith a disk in drive A, scanning floppy disks for viruses, checking downloaded programs, andregularly backing up files. 3. How Can a Computer Be Safeguarded?An antivirus program protects a computer against viruses by identifying and removing anycomputer viruses found in memory. Access controls prevent unauthorized access and use bydefining who can access a computer, when they can access it, and what actions they can take. Physical access controls and common sense can minimize hardware theft. A software licenseaddresses software piracy by specifying conditions for software use. Encryption reducesinformation theft by converting readable data into unreadable characters. Surge protectors anduninterruptable power supplies guard against system failure by controlling power irregularities. 4. Why Is Computer Backup Important and How Is It Accomplished?A backup is a duplicate of a file, program, or disk that can be used if the original is lost, damaged,or destroyed. In case of system failure or the discovery of corrupted files, the backup can be used torestore the files by copying the backed up files to their original location. Backup proceduresspecify a regular plan of copying and storing important data and program files. Organizations canaccomplish a backup using one of, or combinations of, three methods: a full backup, whichduplicates all files; a differential backup, which duplicates only files changed since the last fullbackup; or an incremental backup, which duplicates only files changed since the last full orincremental backup. 5. What Are the Components of a Disaster Recovery Plan?A disaster recovery plan is a written plan describing the steps an organization would take torestore computer operations in the event of a disaster. A disaster recovery plan has four majorcomponents. An emergency plan specifies the steps to be taken immediately after a disasterstrikes. A backup plan details how an organization will use backup files and equipment to resumeinformation processing. A recovery plan stipulates the actions to be taken to restore full informationprocessing operations. A test plan contains information for simulating different levels of disastersand recording an organizations ability to recover. .u3de4ab7773bc002a346319894ce5418c , .u3de4ab7773bc002a346319894ce5418c .postImageUrl , .u3de4ab7773bc002a346319894ce5418c .centered-text-area { min-height: 80px; position: relative; } .u3de4ab7773bc002a346319894ce5418c , .u3de4ab7773bc002a346319894ce5418c:hover , .u3de4ab7773bc002a346319894ce5418c:visited , .u3de4ab7773bc002a346319894ce5418c:active { border:0!important; } .u3de4ab7773bc002a346319894ce5418c .clearfix:after { content: ""; display: table; clear: both; } .u3de4ab7773bc002a346319894ce5418c { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u3de4ab7773bc002a346319894ce5418c:active , .u3de4ab7773bc002a346319894ce5418c:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u3de4ab7773bc002a346319894ce5418c .centered-text-area { width: 100%; position: relative ; } .u3de4ab7773bc002a346319894ce5418c .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u3de4ab7773bc002a346319894ce5418c .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u3de4ab7773bc002a346319894ce5418c .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u3de4ab7773bc002a346319894ce5418c:hover .ctaButton { background-color: #34495E!important; } .u3de4ab7773bc002a346319894ce5418c .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u3de4ab7773bc002a346319894ce5418c .u3de4ab7773bc002a346319894ce5418c-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u3de4ab7773bc002a346319894ce5418c:after { content: ""; display: block; clear: both; } READ: TITLE Essay Summary6. What Are Issues Relating to Information Privacy?Information privacy refers to the right of individuals and organizations to deny or restrict thecollection and use of information about them. Information privacy issues include unauthorizedcollection and use of information and employee monitoring. Unauthorized collection and use ofinformation involves the compilation of data about an individual from a variety of sources. The data iscombined to create an electronic profile that, without an individuals permission, may be sold to otherorganizations. Employee monitoring involves the use of computers to observe, record, and reviewan individuals use of a compu ter, including communications, keyboard activity, and Internet sitesvisited. 7. What Are Ethical Issues with Respect to the Information Age?Computer ethics are the moral guidelines that govern the use of computers and informationsystems. Unauthorized use of computer systems, software theft, and information privacy arefrequently discussed ethical issues. Other important ethical issues are the responsibility forinformation accuracy and codes of conduct that help determine whether a specific computeraction is ethical or unethical. 8. What Are Internet-Related Security and Privacy Issues?Information transmitted over networks has a higher degree of security risk than information kept onan organizations premises. On a vast network such as the Internet, the risk is even greater. Toprovide secure data transmission, many Web browsers use Internet encryption methods such asSecure Socket Layers and digital signatures. The most discussed ethical issue concerning theInternet is the availability of objectionable material.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.