ethics and safety management. health safety when using a computer for long periods of time, you can...

13
Ethics and Safety Management By: Tony Aiello Vs .

Upload: luis-hakey

Post on 15-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Ethics and Safety Management

By: Tony Aiello

Vs.

Health Safety

When using a computer for long periods of time, you can cause health risks ranging from minor to major.

Ex.• RSIs (Repetitive Strain Injury)• Blood Clots • Back Issues (Lumbar)• Headaches/Migraines • Arthritis

There are several ways to avoid health issuesconcerning computers. Ex.• Using Ergonomic Equipment/High Resolution

Monitor• Avoid sitting in the same position for a full use

period• Adjust background lighting• Taking breaks every half hour or less

Security Risks

As with many other things computers have security risks. These risks can range from miniscule to extremely harmful. The main risks are identity theft, data corruption, and viruses.These risks are caused hackers or crackers.

Computer hackers and crackers are generallycomputer experts who gain satisfaction fromdefeating a security system and can steal, change, or damage stored data.

The leading programs used by hackers and crackers to damage or steal data are• Sniffers (Search for important data)• Dictionary Attackers (Uses a file of words to solve passwords)• Keyloggers (Records all actions)• Spyware (Checks actions, searches for data)• Trojans (Damages files)• Worms (Multiplies itself)

Along with hackers and crackers, a power outageor mechanical failure could result in severedamage or complete loss of data. That’s why it isessential to backup your data on an externalstorage device and save your data every sooften. It is also not a bad idea to get an uninterruptible power supply like a battery to support your system in a power outage.

Access RestrictionsTo help safeguard against hackers, viruses,Trojans, and worms, it is smart to set a strong router password. A strong password (contains

at least one letter, number, or special character.) protects against brute force attacks, also called dictionary attacks which use a program that tries various words or phrases in the dictionary file to find your password.

It is also important to beware aware of tactics such as phising or the fraudulent use of a similar site to obtain someone’s information such as PIN numbers.

Private PropertyContrary to common belief, if you do any activities on a company or organization’s computers, the information that is saved is considered their property and can be used for legitimate purposes. This is why companiesusually have a policy form that must be signed before you can use their computers.

E-CommerceBefore you make any transactions on the internet it is imperative that you check the site to ensure it is secure. Sites such as godaddy.compresent a Transport Layer Security (TLS) or Secure Sockets Layer (SSL) certificate for sites that process sensitive data.

Both SSL and TLS programs implement a private key and a public key. The private key deciphersthe information where as the public key encrypts. This form of encryption is calledasymmetric cryptography. Cryptography is the process of encrypting and deciphering data. Cryptography is derived from the Latin word Kratos which meant hidden.

Changes and Responsibilities As with the constantly changing work place, theinternet is changing as well. So it is crucial to always stay up to date with acceptable usage rules. A good example of incorrect and unethical usage is the rising issue of software piracy in companies. Instead of a company purchasing a network version of a software program, they buy the basic version for extremely less and upload it to every computer in their possession.

Image Locations – • http://www.e4hats.com/_e/Black_Band_Wool_Felt_Hat/product/bb002ft-black/Black_Band_Wool_Felt• http://www.weschenfelder.co.uk/files/imagecache/main_product_shot/%252F2440+Trilby.JPG• http://www.1stwebdesigner.com/design/things-work-makes-freelancer-sad/• http://3.bp.blogspot.com/_UTnMsP0jyxY/TLhs3ura4nI/AAAAAAAAACc/Rtio301IsrM/s1600/ergonomics_simpsons_poster_s1112__534

45.gif• http://www.toonpool.com/cartoons/Hackers_103007• http://www.un-interruptiblepower.co.uk/graphics/uninterruptiblepower_suppli.jpg• http://obiblog.files.wordpress.com/2008/08/data-pic.jpg• http://www.gizmodo.com.au/2011/07/theres-a-botnet-called-tdl-4-thats-virtually-indestructible/• http://databasementor.com/wp-content/uploads/crestockimages/1331889-ms.jpg• http://www.sciencephoto.com/image/350257/530wm/T4650205-Computer_virus-SPL.jpg• http://computersafetytips.files.wordpress.com/2008/12/computer-worm.jpg• http://computerht.com/wp-content/uploads/2008/01/computer-how-to-spyware-cool-pic.gif• http://www.modssl.org/docs/2.0/mod_ssl.jpg• http://www.zytrax.com/tech/survival/asymmetric.gif• http://robcma.files.wordpress.com/2011/02/got-ethics.jpg

Information Location – • Morrison, C., & Wells, D. J. (2011). Computer literacy basics, a comprehensive guide to ic3. (3rd ed., pp. Mod3-151 - Mod3-

167). Course Technology Ptr.