Safeguards for Preventing the Unethical Use of Computers

By : Dhishan Kandala

Introduction

     Computers contain valuable data that can easily be accessed by anyone. Without safeguards anyone could access and steal the information stored on your computer. You also need to ensure that you have strong safeguards because weak safeguards typically won't be helpful in protecting against malware devices. Using safeguards drastically lowers the risk of your data being stolen.


Types of Cybersecurity Threats(2)

  1. Computer Viruses
  2. Spyware Threats
  3. Hackers
  4. Phishing

Computer Viruses




A virus is a program written to change the way a computer works, without the user's permission or knowledge. A virus is a dangerous application which replicates itself by copying itself to a different program. The purpose of a computer virus is to damage exposed systems, gain admin access, and steal delicate user data.(7)

Spyware Threats

A significant computer security threat, spyware is any software that monitors your online activities or install applications without your permission to profit or to capture private information. Spyware gathers the user's personal data and transfers it to advertisers, data firms, or external users.(8)

Hackers

Hackers and predators are programmers that attack other people's computer systems by breaking into them to steal, alter, or destroy information. A hacker can: (9)

Phishing

Phishing is when an individual sends fraudulent emails claiming to be from a credible company in order to convince the individual to disclose their personal information, such as passwords and credit card numbers.


Types of Safeguards


TYPES OF SAFEGUARDSDEFINITION
Firewalls A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules."(1)
Effective Passwords A set of characters used to access computer systems or services. Passwords allow only specific users to be able to access the information.(5)
Biometric Data Biometrics is the term typically used for body measurements. Biometric authentication is used as a form of identification for many different devices.(6)
Antivirus Software Antivirus software is a set of programs that are created to prevent, look for, detect, and remove software viruses and other malicious software like worms, trojans, adware, and more.(10)



Firewalls

  1. Inherited name from the physical firewall(1)
  2. Controls incoming and outgoing network traffic(1)
  3. Typically establishes a barrier between a trusted internal network and untrusted external networks(1)

Effective Passwords

  1. Strong Passwords usually contain at least six characters(4)
  2. Typically a combination of letters, numbers, and other special characters(4)
  3. Includes both upper and lower case letters(4)

Biometric Data

  1. Physiological measurements of biometric data can either be morphological or biological.(11)
  2. Morphological measurements include:(11)
    1. Fingerprints
    2. Shape of Hand
    3. Vein Pattern
    4. Iris
    5. Retina
    6. Shape of Face
  3. Biological measurements include:(11)
    1. DNA
    2. Blood
    3. Saliva
    4. Urine

Antivirus Software

  1. All antivirus softwares perform similar and crucial functions:(10)
    1. Scan specific files for any malware
    2. Allows you to schedule automatic scans to run on your computer
    3. Deletes any malicious code detected- some programs notify and ask you, others do it automatically.
    4. Allows you to scan a specific file or your entire computer at any time

Questions

  1. What is the purpose of a computer virus?
  2. What is the definition of Biometric Data?
  3. What are two functions of Antivirus Software?
Answers

Works Cited

(1) : What Is a Firewall? (2019, May 28). Retrieved January 10, 2020, from https://www.cisco.com/c/en_ca/products/security/firewalls/what-is-a-firewall.html

(2) : Types of Computer Security Threats and. (n.d.). Retrieved January 10, 2020, from https://www.webroot.com/au/en/resources/tips-articles/computer-security-threats

(3) : Edwards, C. (2017, November 21). Ways to Safeguard Computers. Retrieved January 10, 2020, from https://smallbusiness.chron.com/ways-safeguard-computers-45589.html

(4) : What is a Password? (2018, November 26). Retrieved January 14, 2020, from https://www.computerhope.com/jargon/p/password.htm

(5) : Protect Your Computer From Viruses, Hackers, and Spies. (2017, November 1). Retrieved January 16, 2020, from https://oag.ca.gov/privacy/facts/online-privacy/protect-your-computer

(6) : An Overview of Biometric Recognition. (2012, January 7). Retrieved January 16, 2020, from https://web.archive.org/web/20120107071003/http://biometrics.cse.msu.edu/info.html

(7) : What is a Computer Virus?: Types of Computer Viruses [Updated 2020]. (2020, January 27). Retrieved January 20, 2020, from https://antivirus.comodo.com/blog/computer-safety/what-is-virus-and-its-definition/

(8) : NortonOnline. (n.d.). What is spyware? And how to remove it. Retrieved January 20, 2020, from https://us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.html

(9) : The Dangers of Hacking and What a Hacker. (n.d.). Retrieved January 22, 2020, from https://www.webroot.com/gb/en/resources/tips-articles/computer-security-threats-hackers

(10): What is Antivirus Software. (n.d.). Retrieved January 24, 2020, from https://www.webroot.com/gb/en/resources/tips-articles/what-is-anti-virus-software

(11): Biometrics: authentication & identification (definition, trends, use cases, laws and latest news) - 2020 review. (n.d.). Retrieved January 24, 2020, from https://www.gemalto.com/govt/inspired/biometrics

Images

(Virus): Warning of malware attack virus detected skull vector image on VectorStock. (n.d.). Retrieved February 3, 2020, from https://www.vectorstock.com/royalty-free-vector/warning-of-malware-attack-virus-detected-skull-vector-21895282

(Firewall) : Introduction of Firewall in Computer Network. (2019, November 21). Retrieved February 3, 2020, from https://www.geeksforgeeks.org/introduction-of-firewall-in-computer-network/

(Password) : How to Create an Effective Password. (2017, May 30). Retrieved February 3, 2020, from https://safebytes.com/how-to-create-an-effective-password/

(Biometric Data) : Kass. (2019, September 22). Biometric Data Breach Worries Senate Intelligence Committee. Retrieved February 3, 2020, from https://www.msspalert.com/cybersecurity-news/suprema-biostar-2-issue/

(Antivirus Software) : Rsi. (2020, January 14). Protect Cardholder Data With Antivirus Software. Retrieved February 5, 2020, from https://blog.rsisecurity.com/protect-cardholder-data-with-antivirus-software/