DIGITAL SECURITY RISKS
A
digital security risk is any event or action that could cause a loss of or
damage to a computer or mobile device hardware, software, data, information, or
processing capability. However, any illegal act involving the use of a computer
or related devices generally is referred to as a computer crime also known as a
cybercrime, is an online or internet-based illegal act.
HACKER VS CRACKER
HACKER:
i.
Break
the computer system with ethics to test the weakness of the system
ii.
Do not damage the system or destroy data
CRACKER:
i.
Deliberately
breaks the system to bring damage and sabotage elements
ii.
Unethical
iii.
Aggressive
and dangerous
INTERNET AND NETWORK ATTACKS
i.
Malware, short for malicious software, consists of
programs that act without a user’s knowledge and deliberately alter the
operations of computers and mobile devices
How A Virus Can Spread Via An Email Message:
Step 1:
Unscrupulous programmers create a virus program
that deletes all files. They hide the virus in a word processing document and
attach the document to an email message.
Step 2:
Authors send the email message that contains
the infected attachment to thousands of users around the world
Step 3a:
Some users open the attachment and their
computers become infected with the virus
Step 3b:
Other users do not recognize the name of the
sender of the email message. These users do not open the email message. Instead
they immediately delete the email message
and continue using their computers. These users computers are not
infected with the virus.
ii.
A firewall
is hardware and/or software that protects a network’s resources from intrusion
UNAUTHORIZED ACCESS AND USE
1.
Organizations
take several measures to help prevent unauthorized access and use
i.
Acceptable
use policy
ii.
Disable
file and printer sharing
2.
The
computer, device, or network should maintain an audit trail that records in a
file both successful and unsuccessful access attempts.
i.
User
name
ii.
Password
iii.
Passphrase
iv.
CAPTCHA
3.
A
possessed object is any item that you must carry to gain access to a computer
or computer facility
·
Often
are used in combination with a PIN (personal identification number)
4.
A biometric device authenticates a
person’s identity by translating a personal characteristic into a digital code
that is compared with a digital code in a computer.
5.
Digital forensics is the discovery, collection, and analysis
of evidence found on computers and networks
SOFTWARE THEFT
Software
theft occurs when
someone:
i.
Steals
software media
ii.
Intentionally
erases programs
iii.
llegally
registers and/or activates a program
iv.
Illegally
copies a program
INFORMATION THEFT
1.
Information theft occurs when someone steals personal or
confidential information
2.
Encryption is a process of converting data that is readable by
humans into encoded characters to prevent unauthorized access
3.
A digital signature is an encrypted code
that a person, website, or organization attaches to an electronic message to verify
the identity of the sender
·
Often
used to ensure that an impostor is not participating in an Internet transaction
4.
A digital certificate is a notice that
guarantees a user or a website is legitimate
5.
A
website that uses encryption techniques to secure its data is known as a secure site
HARDWARE THEFT, VANDALISM, AND FAILURE
To help reduce the of chances of theft,
companies and schools use a variety of security measures
Hardware Theft And Vandalism Safeguards
|
Hardware Failure Safeguards
|
Physical access control
|
Surge protector
|
Alarm system
|
Uninterruptible power supply (ups)
|
Physical security devices
|
Duplicate components of duplicate computers
|
Device- tracking app
|
Fault-tolerant computer
|
BACKING UP – THE ULTIMATE SAFEGUARD
1.
A
backup is a duplicate of a file, program, or media that can be used if the
original is lost, damaged, or destroyed
·
To back
up a file means to make a copy of it
2.
Off-site backups are stored in a location separate from the computer or mobile device site
Off-site backups are stored in a location separate from the computer or mobile device site
ETHICS AND SOCIETY
1.
Computer ethics are the moral guidelines that govern the use
of computers, mobile devices, and information systems
2.
Information
accuracy is a concern
·
Not all
information on the web is correct
3.
A code of conduct is a written guideline
that helps determine whether a specification is ethical/unethical or allowed/not
allowed
4.
Green computing involves reducing the electricity and
environmental waste while using computers, mobile devices, and related
technologies
INFORMATION PRIVACY
1.
Information privacy refers to the right of individuals and
companies to deny or restrict the collection and use of information about them.
2.
Huge
databases store data online.
3. It is important to safeguard your
information.
4. Information
about user can be stored in a database when user:
i.
Fill out a printed or online form
ii.
Create a social networking profile
iii.
Register a product warranty
5. Phishing
is a scam in which a perpetrator sends an official looking email message that
attempts to obtain your personal and/or financial information
6. With
clickjacking, an object that can be clicked on a website contains a malicious
program.
7. Spyware
is a program placed on a computer or mobile device without the user’s knowledge
that secretly collects information about the user and then communicates the
information it collects to some outside source while the user is online.
8. Adware
is a program that displays an online advertisement in a banner or pop-up window
on webpages, email messages, or other Internet services.
9. Employee monitoring
involves the use of computers, mobile devices, or cameras to observe, record,
and review an employee’s use of a technology, including communications such as
email messages, keyboard activity (used to measure productivity), and websites
visited.
10. Content filtering
is the process of restricting access to certain material on the Web
·
Many businesses use content filtering
11. Web filtering software
restricts access to specified websites
MICROSOFT EXCEL
How To Calculate Letter
Grade In Excel?
To assign letter grade
for each student based on their scores may be a common task for a teacher, for
example, I have a grading scale defined where the score below 60 is an F, 60 to
70 is a D, 70 to 80 is a C, 80 to 90 is a B, and 90 to 100 is an A. In Excel,
how could you calculate letter grade based on the numeric score quickly and
easily?
- Calculate letter grade based on numeric score with IF function
- Calculate letter grade based on numeric score with VLOOKUP function
Calculate Letter Grade Based On Numeric Score With IF Function
The following formula
can help you to quickly calculate the letter grade as you need, please do as
this:
Enter this formula:
=IF(E2>=90,"A",IF(E2>=80,"B",IF(E2>=70,"C",IF(E2>=60,"D","F"))))
into a blank cell next to your score data where you want to locate the letter
grade, F2, for instance, and then drag the fill handle down to the cells that
you want to contain this formula, and the letter grade has been displayed in
each cell as follows:
Note: In the above
formula, E2 is the cell which you want to convert the number to letter grade,
and the numbers 90, 80, 70, and 60 are the numbers you need to assign the
grading scale. You can modify them as you need.
arrow blue right bubble
Calculate Letter Grade Based On Numeric Score With VLOOKUP Function
If there are more
grading scales, such as following screenshot, I have defined a grade scale
table, and now, I want to apply this grade scale to the score list table. In
this case, the VLOOKUP function can help you.
Please enter this
formula: =VLOOKUP(B2,$F$1:$G$10,2,TRUE) into a blank cell beside your data, C2,
for example, and then drag the fill handle down to the cells that you want to
apply this formula, and now, you can see all the letter grades based on the
corresponding grade scale table are calculated at once, see screenshot:
Note: In the above
formula, B2 is the cell which you want to calculate the letter grade, F1:G10 is
the table range you want to look for, the number 2 indicates the lookup table
column number which contains the values you want to return.
No comments:
Post a Comment