Saturday, 17 September 2016

Information Privacy

Information privacy, or data privacy (or data protection), is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them.


Image result for information privacy




                                                             code of ethics is 

The Code of Ethics maintains that you must: Place the integrity of the profession and the interests of clients above your own interests. Act with integrity, competence, and respect. Maintain and develop your professional competence.

                                                          Green computing is 


Green computing is the environmentally responsible and eco-friendly use ofcomputers and their resources. In broader terms, it is also defined as the study of designing, manufacturing/engineering, using and disposing of computing devices in a way that reduces their environmental impact.

cookie is 

An HTTP cookie (also called web cookie, Internet cookie, browser cookie or simplycookie, the latter which is not to be confused with the literal definition), is a small piece of data sent from a website and stored in a user's web browser while the user is browsing that website.



phishing is 

Phishing is the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money), often for malicious reasons, by masquerading as a trustworthy entity in an electronic communication.

   What is Adware and Spyware?


Ad supported software, often called Adware or Advertising Supported Software, is used when referencing any type of program that downloads or displays unwanted banner advertisements in the software being used. Adware is often bundled within software a computer owner purchases. The authors of a program sometimes include adware in their software to recover development costs, or to be able to provide the product for free or at a discounted price. Adware can be designed to collect data on which sites the user visits, send this data back to the company and deliver advertising based on the information. Though the advertisements produced by adware may be seen as an annoyance, a distraction, or an invasion of privacy to the user, the income the developer receives may help them to maintain, upgrade and continue to develop more products. Often, after using a free software product that includes adware, a user may opt to purchase a registered or licensed version without adware to remove the ads. This adware-free product may also have additional functionality.
However, adware can also contain or be classified as spyware, a type of malware that is considered by many to be privacy-invasive. Spyware can steal a user’s information or corrupt the user’s system files. Though adware companies may have a Privacy Policy stating that no sensitive or identifying information will be collected, there is usually no way for the user to be completely sure that he or she remains anonymous. Therefore, because of privacy concerns and the prospect of malicious adware, antivirus software today detects and removes both adware and spyware.

 social engineering is 

These biases, sometimes called "bugs in the human hardware", are exploited in various combinations to create attack techniques, some of which are listed. The attacks used in social engineering can be used to steal employees' confidential information.




Ethics And Society




Image result for technology ethics

Ethics in technology is a sub-field of ethics addressing the ethical questions specific to the Technology Age. Some prominent works of philosopher Hans Jonas are devoted to ethics of technology. The subject has also been explored, following the work of Mario Bunge, under the term technoethics.







Backing Up- The Ultimate Safeguard

cont....................................................back againnn :)


Image result for backing up


What is backup ???????

Backup refers to the copying of physical or virtual files or databases to a secondary site for preservation in case of equipment failure or other catastrophe

usually it used cloud storage as a off-site backup .

What is the category of Backup ????????
  • full 
  • differential 
  • incremental
  • selective
  • continuous data protection
  • cloud

Three-Generation Backup policy 


grandparents-------> parents--------> chlid 

Backup Methods 






































Wireless Security

what is wireless security ?


Wireless security is the prevention of unauthorized access or damage to computers using wireless networks. The most common types of wireless security are Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA).


How do you secure the network ?


If your network is not encrypted, enable encryption on the wireless security settings page of your wireless router. There are different forms of encryption, but we suggest that you use the Wi-Fi Protected Access II (WPA2) version because it is stronger than other versions such as Wired Equivalent Privacy (WEP) and WPA.

Which wireless encryption method is the most secure?

We don't recommend using Wired Equivalent Privacy (WEP) as your wireless security method. Wi‑Fi Protected Access (WPA or WPA2) is more secure. If you tryWPA or WPA2 and they don't work, we recommend that you upgrade your network adapter to one that works with WPA or WPA2.

Hardware Theft , Vandalism and Failure

 Hardware failure 


Image result for hardware failure

  • surge protector
  • uninterruptible power supply( UPS )
  • duplicate component or duplicate computer
  • fault-tolerant computer 

Hardware Theft , Vandalisms , and Failure

Image result for hardware theft

Hardware theft , and vandalism 

Hardware theft – is the act of stealing computer equipment.
Hardware vandalism – is the act of defacing or destroying computer equipment.

Hardware theft and vandalism is common more than ever in the 21st century. Hardware vandalism poses less of a threat to home desktop computer users and individually owned notebooks and phones. Companies, schools, and other organizations that have many computers are at risk of hardware vandalism. This can be true for hardware theft as there are smaller system units, output devices and connecting cables that can fit easily fit into bags and pockets. Hardware vandalism occurs when people cut cables or damage and destroy computers or computers components whereas hardware theft is the stealing of this computers and computer components. All most all measure to protect computers from hardware theft and vandalism are security measures.
Safeguards against hardware theft
To protect yourself from hardware theft you must go out of your way to take extra care of your computer devices. Most preventable measure are common sense but require a constant awareness of risk.
Measures to prevent theft:
  • Get adequate physical security. Lock computer equipment up
  • Put passwords and encryptions on hard disk and install tracking software. This makes the computer useless if stolen
  • Always be aware of the risk of theft and keep an eye on your stuff
Safeguards against hardware vandalism
Since hardware vandalism is more common with schools and companies intense security measure to protect computer equipment. Individually owned and home computer can be protected from hardware vandalism by owners taking special care and treatment of their computers.
Measures to prevent vandalism:
  • Put computer equipment in a secure locked area
  • Install alarm systems and camera surveillance
  • Use a real time location system (example RFID tags) to track high risk or valuable computer items


Information Theft

Digital signature 

a type of electronic signature that encrypts documents with digital codes that are particularly difficult to duplicate.


Digital Certificated

which consumers and businesses can utilise the security applications of Public Key Infrastructure (PKI). PKI comprises of the technology to enables secure e-commerce and Internet based communication


Secured Site 

A website that use encryption technique  to secured its data