0% found this document useful (0 votes)
24 views

Protecting and Securing Information

The document discusses ways that information can be misused through computer crimes such as privacy violations, propaganda, software piracy, fraud, hacking, and identity theft. It then outlines numerous methods for protecting information, including using passwords, encryption, physical and software access restrictions, firewalls, backups, archiving, and virus protection. The key methods are passwords, encryption, physical and software access controls, firewalls, backups, and antivirus software to secure information from threats.

Uploaded by

Kylie smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views

Protecting and Securing Information

The document discusses ways that information can be misused through computer crimes such as privacy violations, propaganda, software piracy, fraud, hacking, and identity theft. It then outlines numerous methods for protecting information, including using passwords, encryption, physical and software access restrictions, firewalls, backups, archiving, and virus protection. The key methods are passwords, encryption, physical and software access controls, firewalls, backups, and antivirus software to secure information from threats.

Uploaded by

Kylie smith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 3

Protecting and Securing Information

Ways information can be misused/computer crimes:

1. Violation of privacy – intrusion into the personal life of another without their
permission.

2. Propaganda - information of a bias and misleading nature used to promote a


particular point of view.

3. Software Piracy – the unauthorized or illegal copying, reproduction, use, sale or


distribution of software products.

4. Computer fraud – the act of using a computer to take or alter electronic data, to
defraud persons, or to gain unlawful use of a computer or system.

5. Hacking – modifying or altering computer software and hardware to accomplish a


goal that is considered to be outside of the creator’s original objective.

6. Electronic eavesdropping – using electronic devices to listen in on conversations


without the knowledge or consent of at least one of the participants.

7. Surveillance – using computer technology to closely monitor or spy on others.

8. Industrial espionage – Spying with the sole intention of discovering the secrets of a
rival manufacturer or other industrial company.

9. Storage of inaccurate information -

10.Identity theft – the fraudulent acquisition and use of a person’s private identifying
information whether for financial gain or to perpetrate some other crime.

11.Credit card fraud – a form of identity theft where a person’s credit card
information is taken and used by another person.
Ways information can be protected:

Because information is valuable, considerable effort is spent protecting it from theft, fire,
viruses, hackers, data loss and data corruption.

Numerous methods are used to protect and secure information. The most widely used of
these methods are:

1. Using passwords
2. File encryption
3. Physical access restriction
4. Software access restriction
5. Using firewalls
6. Back-up and recovery
7. Using fireproof cabinets
8. Archiving
9. Virus protection

Password: is a combination of characters used to prevent unauthorized


computer/software access.

Encryption: the process of encoding information so that it bears no resemblance to the


original in order to secure it.
Encrypted files normally require a key to decrypt the file before it can be used.

Physical Access Restriction: used to prevent unauthorized persons from gaining


physical access to the stored information or computer system.
- Housing the computer in a secured room or building
- Locking manual files or removable storage in a cabinet or vault

Software Access Restriction: this is the process of restricting the access to software.
This may be done by using passwords or encryption.

Firewall: this is a computer program/hardware that identifies weaknesses in networked


computers and tries to prevent persons/hackers from exploiting them.
Firewalls makes it more difficult (not impossible) for hackers to gain unauthorized access
to your computer.

A hacker is a person who tries to gain access to areas on networks that he/she is not
suppose to have access to.

Back-up & recovery: this is making a second copy of your data and storing it at a
different location so that if the original is lost, stolen or damaged you’d be able to
continue operating as normal.
Archiving: When data has remained unchanged for a long period of time and is not
accessed on a regular basis, it is said to be inactive. If this information/data is taking up
valuable space you may consider moving it to another location, this is known as archiving
the data.

Virus Protection: A virus is a program designed to corrupt the files on a person’s


computer and/or prevent the computer from working properly. A virus can cause
damage to programs and data.

An anti-virus program (or virus guard) is a special type of program that tries to detect
and remove viruses found on a computer or storage media using its virus definitions –
information about how to recognize particular viruses.

Antivirus Software:
1. Symantec Norton Antivirus
2. Eset NOD32
3. Kaspersky
4. McAfee
5. F-Secure
6. Bitdefender
7. Panda
8. Avast
9. AVG

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy