Les 7 - Compt Literacy
Les 7 - Compt Literacy
Ethics
In other words
Computer ethics is a concept in ethics that addresses the
ethical issues and constraints that arise from the use of
computers, and how they can be mitigated or prevented.
In summary
Computer systems in general are vulnerable. They play an important role
in the daily lives of individuals and businesses. Special care must be
taken explicitly in order to ensure that the valuable data do not get into
wrong hands. Hence, the data need to be protected.
Cyberbullying:
When people bully other people by the use of electronic communication (
like the web, telephone, etc). it’s referred to as cyberbullying.
Cyberbullying has been done by friends, classmates, relatives, any other
unknown persons. Sending harmful emails to a person creates fake
websites to make fun of or to make harm a person by distributing the
same fake information about a person posting and distributing fake
images of a person. These are some common ways of cyberbullying.
NOTE
We can not discus about Internet security without see a bit
of Information Security
Integrity
Data integrity is about maintaining the accuracy, trustworthiness,
consistency, and reliability of data. This means that the data should not
be compromised or incorrectly modified (either inadvertently or
maliciously) by someone without the proper authority.
In other words
This means that any changes to the information by an unauthorized user
are impossible (or at least detected), and changes by authorized users
are tracked.
Availability
Availability means that information is easily accessible to
authorized users whenever they need it, thus minimizing
interruptions or downtime.
In other words
This principle ensures that the information is fully accessible at any
time whenever authorized users need it. This means that all the
systems used to store, process, and secure all data must be
functioning correctly at all times.
NOTE
The three principles inform and affect one another, and determine
the strength and efficacy of an organization’s infosec program.
END