Ethics and Safety Management

advertisement
Ethics and Safety Management
By: Ton Aiello
Health Safety
When using a computer for long periods of time,
you can cause health risks ranging from minor to
major.
Ex.
• RSIs (Repetitive Strain Injury)
• Blood Clots
• Back Issues (Lumbar)
• Headaches/Migraines
• Arthritis
There are several ways to avoid health issues
concerning computers.
Ex.
• Using Ergonomic Equipment/High Resolution
Monitor
• Avoid sitting in the same position for a full use
period
• Adjust background lighting
• Taking breaks every half hour or less
Security Risks
As with many other things computers have
security risks. These risks can range from
miniscule to extremely harmful. The main risks
are identity theft, data corruption, and viruses.
These risks are caused hackers or crackers.
Computer hackers and crackers are generally
computer experts who gain satisfaction from
defeating a security system and can steal,
change, or damage stored data.
The leading programs used by hackers and
crackers to damage or steal data are
•
•
•
•
•
•
Sniffers (Search for important data)
Dictionary Attackers (Uses a file of words to solve passwords)
Keyloggers (Records all actions)
Spyware (Checks actions, searches for data)
Trojans (Damages files)
Worms (Multiplies itself)
Along with hackers and crackers, a power outage
or mechanical failure could result in severe
damage or complete loss of data. That’s why it is
essential to backup your data on an external
storage device and save your data every so
often. It is also not a bad idea to get an
uninterruptible power supply like a battery to
support your system in a power outage.
Access Restrictions
To help safeguard against hackers, viruses,
Trojans, and worms, it is smart to set a strong
router password. A strong password (contains
at least one letter, number, or special
character.) protects against brute force
attacks, also called dictionary attacks which
use a program that tries various words or
phrases in the dictionary file to find your
password.
It is also important to beware aware of tactics
such as phising or the fraudulent use of a
similar site to obtain someone’s information
such as PIN numbers.
Private Property
Contrary to common belief, if you do any
activities on a company or organization’s
computers, the information that is saved is
considered their property and can be used for
legitimate purposes. This is why companies
usually have a policy form that must be signed
before you can use their computers.
E-Commerce
Before you make any transactions on the
internet it is imperative that you check the site
to ensure it is secure. Sites such as godaddy.com
present a Transport Layer Security (TLS) or
Secure Sockets Layer (SSL) certificate for sites
that process sensitive data.
Both SSL and TLS programs implement a private
key and a public key. The private key deciphers
the information where as the public key
encrypts. This form of encryption is called
asymmetric cryptography. Cryptography is the
process of encrypting and deciphering data.
Cryptography is derived from the Latin word
Kratos which meant hidden.
Changes and Responsibilities
As with the constantly changing work place, the
internet is changing as well. So it is crucial to
always stay up to date with acceptable usage
rules. A good example of incorrect and unethical
usage is the rising issue of software piracy in
companies. Instead of a company purchasing a
network version of a software program, they buy
the basic version for extremely less and upload it to
every computer in their possession.
Image Locations –
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
http://www.e4hats.com/_e/Black_Band_Wool_Felt_Hat/product/bb002ft-black/Black_Band_Wool_Felt
http://www.weschenfelder.co.uk/files/imagecache/main_product_shot/%252F2440+Trilby.JPG
http://www.1stwebdesigner.com/design/things-work-makes-freelancer-sad/
http://3.bp.blogspot.com/_UTnMsP0jyxY/TLhs3ura4nI/AAAAAAAAACc/Rtio301IsrM/s1600/ergonomics_simpsons_poster_s1112__534
45.gif
http://www.toonpool.com/cartoons/Hackers_103007
http://www.un-interruptiblepower.co.uk/graphics/uninterruptiblepower_suppli.jpg
http://obiblog.files.wordpress.com/2008/08/data-pic.jpg
http://www.gizmodo.com.au/2011/07/theres-a-botnet-called-tdl-4-thats-virtually-indestructible/
http://databasementor.com/wp-content/uploads/crestockimages/1331889-ms.jpg
http://www.sciencephoto.com/image/350257/530wm/T4650205-Computer_virus-SPL.jpg
http://computersafetytips.files.wordpress.com/2008/12/computer-worm.jpg
http://computerht.com/wp-content/uploads/2008/01/computer-how-to-spyware-cool-pic.gif
http://www.modssl.org/docs/2.0/mod_ssl.jpg
http://www.zytrax.com/tech/survival/asymmetric.gif
http://robcma.files.wordpress.com/2011/02/got-ethics.jpg
Information Location –
•
Morrison, C., & Wells, D. J. (2011). Computer literacy basics, a comprehensive guide to ic3. (3rd ed., pp. Mod3-151 - Mod3167). Course Technology Ptr.
Download