Sei sulla pagina 1di 19

COMPUTER SECURITY,

SAFETY AND ETHICS


REMEMBER:
In this course we have covered the following topics:
1. Introduction to computer.
2. Introduction to window and operating systems.
3. Word processor
4. Spreadsheet
5. Introduction to Internet, Email and Network.
6. Presentation software-Ms Power Point.
7. Database using Ms Access.
8. Ethics, safety, privacy and security issues in Computer systems
ETHICS,PRIVACY,SAFETY AND
SECURITY IN COMPUTER SYSTEMS

Ethics:
Personal character , trait in which an individual
understands the difference between right and
wrong and acts accordingly.
Privacy-concerns the right of an individual not
to have personal information collected, stored
and disclosed either willfully or indiscriminately.
Safety means protection of the system and
other resources in such a way that it can not
harm or cause danger to the people.
A: COMPUTER ETHICAL ISSUES
The use of IT in business has brought major impacts on society, and thus
raises serious ethical considerations in areas such as:
Privacy ,Crime, Health, Working Conditions, Employment

Some Controversial ethical dimensions that you may have to face


include:
o Should you electronically monitor your employees= work activities and
electronic mail?
o Should you let employees use their work computers for private business, or
take home copies of software for their personal use?
o Should you electronically access your employees= personal records or
workstations?
o Should you sell information about your customers, extracted from
transaction processing systems, to other companies?
COMPUTER ETHICS
Information Ethics

Four basic ethical issues that arise from the use of IT are:
Privacy :
o What information about oneself or one=s associations must a person reveal to others, under
what conditions, and with what safeguards?
o What things can people keep to themselves and not be forced to reveal to others?

Accuracy:
o Who is responsible for the authenticity, fidelity, and accuracy of information?
o Who is to be held accountable for errors in information and how is the injured party to be
made whole?
Property:
o Who owns information?
o What are the just and fair prices for its exchange?
o Who owns the channels, especially the airways, through which information is transmitted?
o How should access to this scarce resource be allocated?
Accessibility:
o What information does a person or an organization have a right or a privilege to obtain, under
what conditions, and with what safeguards?
COMPUTER ETHICS
SOM E OF IMPORTANT COMPUTER ETHICS PRINCIPLES

i. Though shalt not use computer to harm other people


ii. Though shalt not interfere with other peoples work
iii. Though shalt not snoop around in other peoples computer files
iv. Though shalt not use a computer to steal
v. Though shalt not use a computer t bear false witness.
vi. Though shalt not copy or use proprietary software for which you
have not paid.
vii. Though shalt not use other peoples computer resources without
authorization or proper compensation
viii. Though shalt not appropriate other peoples intellectual output
ix. Though shalt always us a computer in the way that ensure
considerations for your fellow humans.
B: HEALTHY AND SAFETY
Despite their merits, computer are likely to bring healthy
problems.
Human beings need rest, social life.
They are prone to headache, stress, tired limbs and
mistakes.
HEALTHY PROBLEMS includes:
Stress:-
o Due to working with new tasks with no sure to cope
with
o Having many works to be finished in limited time
o Being monitored with computer at work place.
o Fear of not being able to learn how to use computer and
possibility of losing job.
HEALTHY PROBLEMS includes..
Repetitive Strain Injury (RSI)
RSI-is a collective name for a variety of disorders
affecting neck, shoulders and upper limbs
Results may be aching and stiffness of the arm and
neck, shoulders, numbness and tingling in the arm and
neck and excruciating pain in typing.
WHY RSI?
o Constant sitting.
o Perpetual motion of the hand in the same manner and
attention and application of the hand.
o Constant writing.
HEALTHY PROBLEMS includes..
Eyestrain
o Users are prone to eyestrain for spending long hours in
front of the screen
What contribute to eyestrain?
glare, improper lighting, improper corrected
visualization, poor work practices and poorly designed
workstations.

EXTREMLY LOW FREQUENCY RADIATION-(ELF)


o ELF from screen and VDU may bring healthy problems.
o Studies show that there is a link between monitor use
and problem in pregnancy such as early miscarriages.
o However this case is not yet clear cut.
SO HOW TO PROTECT
OURSELVES?....
What is to be done to protect ourselves from
computer related illness?

For the owner or employer:


o Analyze and evaluate safety and healthy
conditions to which they give rise;
o Train employers about safety use of the
computers
o Introduce regular breaks and change activities.
o Provide regular eye tests for users and provides
glasses for protecting excessive rays from the
screen
HOW TO PROTECT FROM
COMPUTER RELATED ILLNESS

What to be done by the user or employee?


o Use computer workstations, labs, rooms etc and
equipments correctly.
o Attend safety training and put in action what has
been trained.
o Report any healthy problem or danger
associated with using computer to your
employer or supervisor immediately when
experienced.
ERGONOMIC ENVIROMENT IN
COMPUTER SYSTEMS
Ergonomic environment refers to the design and functionality
the environment in which computer systems is to be placed.
Employers or Owners of the computer systems must consider a
number of factors for proper functionality and safety of the system:

Lighting:-offices must be well lit and ventilated


Furniture:-Consider height, Swiveling of equipment, their
arrangement etc
Working space-must contribute to the overall workers well being
Hardware:-e.g... screen must tilt and swivel and be flicker free.
Software-that is easy to use, and perform required tasks
FACTORS THAT GIVE RISE TO
HEALTHY PROBLEMS IN IT
ENVIROMENT.
Some factors that could give rise to healthy or safety
problems associated with the use of information
technology equipment.
o Incorrect positioning of a computer facing window can
lead to eyestrain from screen glare
o Incorrect seating position can lead to backache
o Constant typing with inadequate breaks can lead to RSI
(repetitive strain injury)
o Badly designed software can cause stress and desire of
not continuing working with computer and may cause
frustration and stress
o Trailing electric cables can be a safety hazard.
C:PROTECTING COMPUTER SYTEMS
AND DATA
COMPUTER SECURITY
What is computer security?
o Protection of computer resources and data
from unauthorized user and its
consequence attacks
o The protection is from within and outside
of the organization.
THREATS TO COMPUTERS SYSTEMS
AND DATA
A threat is any situation or event, whether intentional
or unintentional, that will adversely affect a system and
consequently an organization
Internal threats:
o Hardware failure-example disc head crash, may lead to
data loss
o Faulty procedures-due to untrained user
o Natural disaster-such as fire, earthquake, floods
o Negligence
o Dishonest employer
External threats:
Hackers
Virus attacks and infection
MEASURES TO PROTECT COMPUTER
SYSTEMS FROM ILLEGAL ACCESS

1. Physical restrictions to the buildings


and/ or computer labs:
a. By wearing ID badges for identification
b. Wearing temporary ID for visitors
c. Using locked doors-opened by authorized
staff only .
MEASURES TO PROTECT .
2. The use of user ID and password in
logging in to the system
3. Restricting access to various data files,
they must be accessed by using user ID
and password.
4. Installing special software for
maintaining audit trial ,by keeping log
in records
PROTECTION OF DATA AGAINST
ACCIDENTAL LOSS
i. use of periodic Backup:
o provide a copy of your work and store it
in another storage device such as
magnetic tape, flash disk .
o store the backup copies of your data in
a secure, safe and fireproof building off
site .
PROTECTION OF DATA AGAINST
ACCIDENTAL LOSS
ii. Use and frequent updating of
antivirus software for protecting the
computer programs and data from
destructive virus attacks
iii. Staff should be forbidden to bring in disk
from outside organization to reduce the
risks of introducing computer virus.
iv. Staff and other users of the computer
systems must obey security procedures.
ETHICS, SAFETY, PRIVACY AND
SECURITY
Attention to students:
The discussion about Ethics, Safety,
Privacy and Security and issues in
computer systems is so wide. Here we just
give you just the concepts about it.

Freemmile technologies

Potrebbero piacerti anche