Digital
Safety and Security
Ø Digital Security Risks
§ any event or action that could cause a loss of or
damage to a computer or mobile device hardware, software, data, information, or
processing capability.
§ Any illegal act involving the use of a computer or
related devices generally is referred to as a computer crime
§ Hacker is who break the
computer system to test the weakness of the system and not damage the system or
data.
§ Cracker is deliberately
breaks the system to bring damage and sabotage element
Ø Internet and Network Attacks
Ø Unauthorized Access and Use
§ the use of a computer or network without permission
and data for unapproved or possibly illegal activities
§ Access controls define who can access a computer,
device, or network; when they can access it; and what actions they can take
while accessing it
§ A possessed object is any item that you must carry to
gain access to a computer or computer facility
§ A biometric
device authenticates a person’s identity by translating a personal
characteristic into a digital code that is compared with a digital code in a
computer
Ø Software Theft and Information Theft
§ Software
theft is someone steal software media, intentionally erases programs, illegally
registers and activities a program and illegally copies a program.
§ Information theft occurs when someone steals personal or confidential
information
Ø Hardware Theft, Vandalism, and Failure
§ Hardware theft is the act of stealing digital
equipment
§ Hardware vandalism is the act of defacing or
destroying digital equipment
Ø Backing Up
Ø Ethics and Society
§ Computer ethics are the moral guidelines that govern the use of
computers, mobile devices, and information systems
§ Intellectual property refers to unique and original
works such as ideas, inventions, art, writings, processes, company and product
names, and logos
§ Green computing involves reducing the electricity and environmental
waste while using computers, mobile devices, and related technologies
Inside computers and
mobile devices
Ø Inside the case
§ contains and protects the electronics of the computer
or mobile device from damage
§
motherboard is the main circuit board of the computer
§
The
processor, also called the central processing unit (CPU), interprets and carries out the
basic instructions that operate a computer
Ø Data Representation
§
Analog
signals are continuous and vary in strength and quality
§
Digital signals are in one of two states: on or off
§
The
binary system uses two unique
digits (0 and 1)
Ø Memory
§
Read-only memory (ROM)
refers to memory chips storing permanent data and instructions
§
Flash memory can be erased electronically and rewritten.
Ø Adapters, Power Supply and Battery
§
adapter card enhances functions of a component of a desktop or
server system unit and/or provides connections to peripherals
§
expansion slot is a socket on a desktop or server motherboard that
can hold an adapter card
§
The
power supply or laptop AC
adapter converts the wall outlet AC power into DC power
§
Batteries
typically are rechargeable lithium-ion batteries because mobile computers and
devices can run using either a power supply or batteries



No comments:
Post a Comment