Deep Red Flaming

Chapter 5 & 6

Digital Safety and Security

  Ø  Digital Security Risks
§  any event or action that could cause a loss of or damage to a computer or mobile device hardware, software, data, information, or processing capability.
§  Any illegal act involving the use of a computer or related devices generally is referred to as a computer crime
§  Hacker is who break the computer system to test the weakness of the system and not damage the system or data.
§  Cracker is deliberately breaks the system to bring damage and sabotage element
  Ø  Internet and Network Attacks

  Ø  Unauthorized Access and Use
§  the use of a computer or network without permission and data for unapproved or possibly illegal activities
§  Access controls define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
§  A possessed object is any item that you must carry to gain access to a computer or computer facility
§  A biometric device authenticates a person’s identity by translating a personal characteristic into a digital code that is compared with a digital code in a computer
Ø  Software Theft and Information Theft
§  Software theft is someone steal software media, intentionally erases programs, illegally registers and activities a program and illegally copies a program.
§  Information theft occurs when someone steals personal or confidential information
  Ø  Hardware Theft, Vandalism, and Failure
§  Hardware theft is the act of stealing digital equipment
§  Hardware vandalism is the act of defacing or destroying digital equipment
  Ø  Backing Up












  Ø Ethics and Society
§  Computer ethics are the moral guidelines that govern the use of computers, mobile devices, and information systems
§  Intellectual property refers to unique and original works such as ideas, inventions, art, writings, processes, company and product names, and logos
§  Green computing involves reducing the electricity and environmental waste while using computers, mobile devices, and related technologies

Inside computers and mobile devices

  Ø  Inside the case
§  contains and protects the electronics of the computer or mobile device from damage

§  motherboard is the main circuit board of the computer
§  The processor, also called the central processing unit (CPU), interprets and carries out the basic instructions that operate a computer
  Ø  Data Representation
§  Analog signals are continuous and vary in strength and quality
§  Digital signals are in one of two states: on or off
§  The binary system uses two unique digits (0 and 1)
  Ø  Memory
§  Read-only memory (ROM) refers to memory chips storing permanent data and instructions
§  Flash memory can be erased electronically and rewritten.
  Ø  Adapters, Power Supply and Battery
§  adapter card enhances functions of a component of a desktop or server system unit and/or provides connections to peripherals
§  expansion slot is a socket on a desktop or server motherboard that can hold an adapter card
§  The power supply or laptop AC adapter converts the wall outlet AC power into DC power
§  Batteries typically are rechargeable lithium-ion batteries because mobile computers and devices can run using either a power supply or batteries



No comments:

Post a Comment