Tumblr Mouse Cursors
Nazirah Marash: Digital Safety and Security & Microsoft Excel expr:class='"loading" + data:blog.mobileClass'>

Friday, September 21, 2018

Digital Safety and Security & Microsoft Excel


Image result for security gif cartoon


Digital security risk : any event or action that cause loss to a device hardware or processing capability.
Computer crime : any illegal act related the use of a devices generally
Cybercrime : an online illegal act

EXAMPLE:

  • hardware, software, or information theft
  • theft
  • system failure
  • networks attack

                               Hacker                                                                            Cracker
      - break the system, just to test the weakness                - breaks and sabotage the element of system
      - do not damage or destroy the system                          - aggressive and dangerous, unethical

  • Rather than information on an organization's premises, data transmitted over the network has higher degree risk
  • Malicious software (Malware), contains program that acts without the knowledge of users
  • Firewall, software that protects a network's resources from intrusion
Image result for firewall in emoji movie

Unauthorized Access and Use

  • Unauthorized access is the use of a computer or network without permission, to prevent it , the secure site use Encryption 
  • Unauthorized use is the use of a computer or its data for unapproved or illegal activity
Related image
  • An possessed object is any item that you must carry to gain access to a computer , personal identification number (PIN), using biometric device
  • Digital forensic, analysis of evidence in networks
  • Software theft occurs, when stealing the software media, erase programs, and copies program illegally. Thus, we use license agreement so that they follow the conditions
  • Information theft occurs when someone steals personal or confidential information
  • Hardware crime either theft or vandalism, it is related to digital equipment
  • A backup is a duplicate of a file, program, or media that can be used if the original is lost, damaged, or destroyed
Information privacy
  • Refers to the right of individuals and companies to deny or restrict the collection and use of information about them
  • Phishing is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information
Ethics and Society
  • Digital rights management (DRM) is a strategy designed to prevent illegal distribution of movies, music, and other digital content 
  • The most concern things about information accuracy
  • Web filtering software restricts access to specified websites
Microsoft Excel

Di atas penghasilan Microsoft Corporation, sebuah aplikasi perisian lembaran kerja telah berfungsi dalam pengunaan teks, perhitungan dan manipulasi carta bagi menyelesaikan tugasan seperti perakauanan.

Proses yang dilampirkan menjadi contoh yang dapat membantu pengguna dalam merekod, dan mengira dengan mudah berkenaan kedatangan, pencapaian, atau perbelanjaan sesebuah organisasi (contohnya : sekolah).

No comments:

Post a Comment

Blogger WidgetsBlogger Widgets