Ethics and Safety Management By: Ton Aiello Health Safety When using a computer for long periods of time, you can cause health risks ranging from minor to major. Ex. • RSIs (Repetitive Strain Injury) • Blood Clots • Back Issues (Lumbar) • Headaches/Migraines • Arthritis There are several ways to avoid health issues concerning computers. Ex. • Using Ergonomic Equipment/High Resolution Monitor • Avoid sitting in the same position for a full use period • Adjust background lighting • Taking breaks every half hour or less Security Risks As with many other things computers have security risks. These risks can range from miniscule to extremely harmful. The main risks are identity theft, data corruption, and viruses. These risks are caused hackers or crackers. Computer hackers and crackers are generally computer experts who gain satisfaction from defeating a security system and can steal, change, or damage stored data. The leading programs used by hackers and crackers to damage or steal data are • • • • • • Sniffers (Search for important data) Dictionary Attackers (Uses a file of words to solve passwords) Keyloggers (Records all actions) Spyware (Checks actions, searches for data) Trojans (Damages files) Worms (Multiplies itself) Along with hackers and crackers, a power outage or mechanical failure could result in severe damage or complete loss of data. That’s why it is essential to backup your data on an external storage device and save your data every so often. It is also not a bad idea to get an uninterruptible power supply like a battery to support your system in a power outage. Access Restrictions To help safeguard against hackers, viruses, Trojans, and worms, it is smart to set a strong router password. A strong password (contains at least one letter, number, or special character.) protects against brute force attacks, also called dictionary attacks which use a program that tries various words or phrases in the dictionary file to find your password. It is also important to beware aware of tactics such as phising or the fraudulent use of a similar site to obtain someone’s information such as PIN numbers. Private Property Contrary to common belief, if you do any activities on a company or organization’s computers, the information that is saved is considered their property and can be used for legitimate purposes. This is why companies usually have a policy form that must be signed before you can use their computers. E-Commerce Before you make any transactions on the internet it is imperative that you check the site to ensure it is secure. Sites such as godaddy.com present a Transport Layer Security (TLS) or Secure Sockets Layer (SSL) certificate for sites that process sensitive data. Both SSL and TLS programs implement a private key and a public key. The private key deciphers the information where as the public key encrypts. This form of encryption is called asymmetric cryptography. Cryptography is the process of encrypting and deciphering data. Cryptography is derived from the Latin word Kratos which meant hidden. Changes and Responsibilities As with the constantly changing work place, the internet is changing as well. So it is crucial to always stay up to date with acceptable usage rules. A good example of incorrect and unethical usage is the rising issue of software piracy in companies. Instead of a company purchasing a network version of a software program, they buy the basic version for extremely less and upload it to every computer in their possession. Image Locations – • • • • • • • • • • • • • • • http://www.e4hats.com/_e/Black_Band_Wool_Felt_Hat/product/bb002ft-black/Black_Band_Wool_Felt http://www.weschenfelder.co.uk/files/imagecache/main_product_shot/%252F2440+Trilby.JPG http://www.1stwebdesigner.com/design/things-work-makes-freelancer-sad/ http://3.bp.blogspot.com/_UTnMsP0jyxY/TLhs3ura4nI/AAAAAAAAACc/Rtio301IsrM/s1600/ergonomics_simpsons_poster_s1112__534 45.gif http://www.toonpool.com/cartoons/Hackers_103007 http://www.un-interruptiblepower.co.uk/graphics/uninterruptiblepower_suppli.jpg http://obiblog.files.wordpress.com/2008/08/data-pic.jpg http://www.gizmodo.com.au/2011/07/theres-a-botnet-called-tdl-4-thats-virtually-indestructible/ http://databasementor.com/wp-content/uploads/crestockimages/1331889-ms.jpg http://www.sciencephoto.com/image/350257/530wm/T4650205-Computer_virus-SPL.jpg http://computersafetytips.files.wordpress.com/2008/12/computer-worm.jpg http://computerht.com/wp-content/uploads/2008/01/computer-how-to-spyware-cool-pic.gif http://www.modssl.org/docs/2.0/mod_ssl.jpg http://www.zytrax.com/tech/survival/asymmetric.gif http://robcma.files.wordpress.com/2011/02/got-ethics.jpg Information Location – • Morrison, C., & Wells, D. J. (2011). Computer literacy basics, a comprehensive guide to ic3. (3rd ed., pp. Mod3-151 - Mod3167). Course Technology Ptr.