Computer Concepts: Apply It 1

  • Discuss the role hardware plays in computing
  • Discuss the role software plays in computing
  • Discuss the importance of security in the business computing environment
  • Discuss the challenges to privacy in the business computing environment

The Importance of Computer Safety and Security

The protection of computer systems and information that prevents unauthorized use is referred to as computer security. Computer ethics are guidelines for the morally acceptable use of computers in society. Any criminal offense that involves a computer and a network is referred to as cybercrime. One of the most common types of cybercrimes is identity theft, which occurs when an unauthorized user steals an individual’s personal information, such as a Social Security number or credit card information for economic gain. An increase in the number of hackers—individuals who gain unauthorized access to computer systems in an attempt to steal someone’s information—has prompted the development of software programs designed to protect consumers’ identities, such as LifeLock.

There are strategies you can employ that will keep your computer, and the information you have saved on it, safe and secure from theft and hacking. These include:

  • using security suites that can protect user privacy and security while on the internet
  • using a firewall, which is a barrier between a network that is secured and one that is not secured, to provide additional security
  • setting up password-protected network access
  • avoiding logging in to accounts on an open network (one that is not password protected)
  • using encryption to make it impossible for unauthorized individuals to gain access

Password Management and Biometrics

For all of these threats to online security, there are protective steps you can take. A set of principles and best practices for storing and managing passwords in a manner that is likely to prevent unauthorized access is called password management. You may password protect your computer, as well as various accounts you may access through your computer and the internet. Having a strong password will ensure that hackers cannot figure out your password easily. Many organizations today use multifactor authentication to provide an additional layer of security. For example, when accessing your bank account on your phone or your laptop, you may be asked to enter a specific code that is sent via email or text. This now provides two layers of security—first, entering the correct password, then correctly entering the code that was sent to you. Multifactor authentication can also be used by businesses when accessing the company software or computer network.

Please Pass the Password

Some tips for creating a strong password include:

  • Avoid using a real name (either your own or the company’s) as your password.
  • Use a combination of letters and numbers with at least eight characters.
  • Do not use a complete word such as “password.”
  • Do not reuse passwords.
  • Use a combination of uppercase and lowercase letters.
  • Incorporate special symbols instead of letters or numbers (such as an exclamation point or dollar sign instead of a numeral).

Cookies

After you have searched for a product on the internet, do you notice that you suddenly start receiving advertisements for that product, or that a store website now displays that product on its front page? For that, you can thank cookies. Small data files that are deposited on user hard disks from websites you visit are called cookies. They keep track of your browsing and search history, collecting information about your potential interests to tailor advertisements and product placement on websites. These cookies can be either blocked or accepted, depending on a company’s privacy policy. The potential risk of cookies is that they can store information about the user, user preferences, and user browsing habits. That said, they can also save time by storing users’ login information and browsing preferences, allowing internet pages to load faster than if you had loaded them the first time. Regardless of convenience, it is a good idea to clear cookies from time to time and to restrict cookies on certain sites depending on your own preferences.

Browsing History

Your browsing history includes all websites you may have visited, as well as any actions you may have taken on those websites. It is typically saved locally on your computer within the browser application, as well as with the company that provides the browser. Your internet or data provider may also keep track of your browsing history. While this information is handy to have for future reference, consider clearing your browsing history from your personal computer on a regular basis. Be aware that your employer may also collect this information; while using a work computer, you should avoid visiting websites that do not support your work function. Both Google analytics and your company can theoretically store browsing data for a long time, even after you delete it.