The Importance Of Safe Computing

Great Essays
Chapter 1
Introduction
One of the most striking technological developments of the last fifty years has been the emergence of digital technology as a powerful force in our lives.

For many of us, this technology is embodied in the digital computer, which has evolved to be an essential tool for our work as well as our personal needs. In 1951, when the first commercial electronic digital computer, a UNIVAC I, was delivered to the U.S. Bureau of the Census, computers were essentially unknown to most people, and were found only in a few research laboratories and universities. They were large, expensive, and prone to frequent failure. In contrast, today's computers are relatively small, inexpensive, reliable, and are found in every country.

Shortly
…show more content…
Safe computing is possible, but it takes knowledge, vigilance, and care. The language in this section will include a certain degree of technical jargon.

The first step in devising a security strategy is to understand what “safe computing” means. If you practice safe computing, you are seeking to ensure that:
•your data and programs will not be altered or disappear unless you request it;
•your computer and programs will behave the way their designer intended (with the exception of software bugs which are unintended flaws in program code);
•no one will use your computer, your data, or your network without your permission;
•you will not unknowingly spread computer viruses;
•you will not be annoyed as much by unwanted advertisements (spam);
•no one will watch every move you make on your computer;
•no one will capture any of the data that goes over your wired or wireless network;
•no one will steal your usernames or passwords on systems or sites that you
…show more content…
This data could include your customer lists, financial projections, or proprietary programs that you have written.
•The value of your personal data. Your personal data may not have any clear monetary value, but a loss could be expensive (see later definition of identity theft), and you should consider how much time it may take to recreate the information.
•The threat of computer criminals. As technology has advanced, a class of people who take advantage of networked computers to steal data has emerged.

In some cases, they are operating for benign (or malicious) kicks or to prove to themselves or to their friends that they can do it .In some cases, they are operating for personal gain (stealing credit card information, engaging in fraudulent transactions). In any case, these people can cause inconvenience and damage; in extreme cases they may create serious problems for individuals and businesses whose data has been compromised. Since the Internet is available to users worldwide, it can be complicated, if not impossible, to trace where the attacks are coming from and to stop the intruders permanently.

Security

Related Documents

  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Internet Usage The possibility of being attacked by a hacker of any kind is very real. This understanding is why an organization should limit the availability of Internet websites across the board. In doing so this helps mitigate potential threats from malicious software and users from stealing valuable data that belongs to the…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    For example when a hacker gained access to the user private information such as bank account, the hacker will use the bank details to purchase items. Security protection mechanisms There are many possible security protections mechanisms to protect our own computer and website from viruses and hackers such as firewalls, SSL and passwords.…

    • 440 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    This article provides insight into the sphere of CyberFraud and its effect internationally and nationally (United States of America), it explores statistics on who the criminals target, why they target their victims, the information that is stolen during the attack(s) and the economic effect the attacks hold. The source focusses on the most common aspects of CyberFraud and has valuable statistics of being affected and becoming a victim of the crime. The source explores the major types of CyberFraud; Phishing, Pharming and Identity Theft. The article concludes with how corporations can prevent the attacks and shows the damage (economically) that CyberFraud generates.…

    • 400 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Unit 1 Assignment

    • 783 Words
    • 4 Pages

    COMPUTER ARCHITECTURE AND IMPLEMENTATION Assignment 1 Name: Bhargavi Bussu Student Id: 10000126759 Professor: Paul Wang 1.3 Traditionally a user's view of a Computer system like an Onion. Explain why this concept is outdated and draw a new diagram based on the concept proposed in this book. In Today's current generation the Computer systems are wide opened to the Internet, however threat towards the Computer system have been increasing rapidly at a faster rate.…

    • 783 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    In his revealing book Future Crimes, Marc Goodman shows us the threat that we, as inhabitants of this new technological world, either are facing or going to face in future years. Goodman started his cybercrime resume with the Los Angeles Police Department. After the LAPD, he spent years working for federal agencies such as the FBI and the secret service with on their computer crime units. When he began working with the computer crime units, cybercrimes were still in their infancy, now he has seen the eruption of cyber terrorism and Crime Inc. Goodman’s book shows the American public the vulnerabilities of their social media accounts and how the information obtained from them can be used against them. He also reveals how large the Dark Web really is and how it is already causing threats because of the unregulated sale of every product imaginable.…

    • 494 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    The world was forever changed when on February 15, 1946 the first digitalized computer the ENIAC (Electronic Numerical Integrator and Computer) was introduced. ”Designed and built for the United States Army to calculate artillery firing tables,” (“What is ENIAC) it was however the sheer power of ENIAC’s power and general-purpose programmability that thrilled the public’s dreams. When it was publicized in 1946, ENIAC was referred to in the media as a “giant brain.” Seventy years later and a plethora of new technology since, it is apparent that the dreams of 1946 were more than fulfilled. Modern Technology has evolved to possess the capabilities of being able to monitor vital health components, solve mathematical algorithms, upload and view…

    • 1379 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    White Collar Crime Paper

    • 1009 Words
    • 5 Pages

    For instance, in 2015, researchers estimated that 43 percent of the world population are using the Internet. A year later, the number increased from 43 percent to 47 percent (Taylor, 2016). The fact that more people are using the Internet, the more technocrimes, and other form of white-collar crimes would be committed. As it is stated on the text (Trusted Criminals), “Computers and other forms of modern technology play an increasingly central role in many white-collar crimes, and this role will surely expand in the future” (Friedrichs, 2010). With that say, certain form of white-collar crimes will continue to be increasing as world population getting to involve more on the…

    • 1009 Words
    • 5 Pages
    Improved Essays
  • Brilliant Essays

    1.0 INTRODUCTION: Nowadays, the technology has made computer crime has been increasing at an alarming rate. Rapid development of information technology (IT) has brought with many new applications and opportunities that brings positive and negative effect in our lives. In addition, people around the world can communicate in real time on variety types of devices such as cell phones, tablets, computers and etc.…

    • 1780 Words
    • 8 Pages
    Brilliant Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Internet is something that most individuals would have a hard time giving up and the population with this mindset is only growing. Instant gratification has and is becoming more expected. Causing people to lose jobs and get more innovative in how they make money. One issue that stems from this new evolving gratification is the stealing of personal information for the use of personal…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    I read the book Nine Algorithms that Changed the Future by John MacCormick. Nine Algorithms that Changed the Future is a 210-page book that covers fascinating algorithms that we all use in our everyday lives. As MacCormick puts it “Every day, we use our computers to perform remarkable feats. Uploading a photo to Facebook transmits millions of pieces of information over numerous error-prone network links, yet somehow a perfect copy of the photo arrives intact.” MacCormick’s writings explains how our computers can handle these complex tasks with ease in way that everyone can understand.…

    • 952 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Introduction When it comes to digital crimes, various methods are used to commit such acts. These include: Hacking, malicious software as well as cyber stalking, to name a few takes place day in and day out. The names that are attached to these crimes in fact explains the what and now, the why has to be explained. In this body of work however, it will be discussed theories surrounding digital crimes. Space Transition Theory and Social Learning Theory will provide detail and insight as to the why factor: why was the crime committed, the rationale of the response, how it relates to crime in general.…

    • 795 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Web Server and Security Development Life Cycle Most organizations use web applications through the use of the internet as part of their business process and functions to fulfill their objectives, business requirements and needs of their company. When implementing these applications, they have to make sure that security is a part of each step that they follow in the development lifecycle. If security is not implemented, then such software or applications, such as web server or web application, can be detrimental to the organization and cost in money, time, production, and many other areas of the business. There is so much information that is used and passed along within an organization that it is imperative that the correct information is used…

    • 1189 Words
    • 5 Pages
    Improved Essays