SECURITY AND COMPUTER ETHIC: It refers to safeness and good conduct of dealing with computer usage.
SOURCES OF SECURITY BREACHES
1) VIRUS: A virus is a program that attaches itself to another program on a disk or hangs about in a computer memory and spreads from one program to other causing damages.
2) WORMS: A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other computers on a network. Unlike a virus, it does not need to attach itself to an existing program.
3) TROJAN HORSES: They are program that are created for the specific purpose of disturbing your privacy, stealing data, taking over or damaging your computer.
4) SPYWARE: They are program that avoid detection that may disturb your privacy or expose your computer to attack.
5) ADWARE: They are typically not dangerous. They are just annoying. These programs have bait and switched customer into viewing annoying blinking advertisement on the program’s main window.
Other security breaches are;
i) Poor implementation of network
ii) Poor implementation or lack of ICT policies
iii) Carelessness – giving out personal and vital information on the internet without careful screening.
iv) Hackers and spammers: It refers to the effort of people to disturb the smooth running of computer system.
PREVENTIVE MEASURES OF SECURITY THREATS
i) Use of antivirus software e.g. Norton, McAfee, AVG antivirus etc.
ii) Use of firewall
iii) Exercising care in giving out vital and personal information
iv) Encryption: It is the process of putting information into a special code, especially in order to prevent access without authority.
v) Proper network implementation and policies.
vi) Using sites with web certificate.
vii) Exercising care in opening e-mail attachment.
FIREWALL: It is a part of a computer system that prevents people from getting at information without permission but still allows them to receive information that is sent to them.
LEGAL ISSUES ASSOCIATED WITH COMPUTER SYSTEM
– Ownership right to the following; text, images, audio, video
– Privacy of audio and video software
– Cyber crimes
– Identity theft