Ge 10 - Living in An It Era: Flexible Dominican Education Module
Ge 10 - Living in An It Era: Flexible Dominican Education Module
COURSE:               Ge 10
MODULE NO.:           5
MODULE TITLE:         Living in an IT Era
TOPIC:                Computer Security, Safety and Ethics
WRITERS:              Allan L. Tan & Joshua Mitchell Guan
OPENING PRAYER:
AS WITH MOST OTHER facets of modern life, computing has its share of troublemakers, scam artists, and
identity thieves. The value of a stolen computer is not so much in the hardware as in the data it contains.
With stolen data such as your bank account numbers and PINs, a thief can wipe out your checking and
savings accounts. With your credit card numbers, a thief can go on a spending spree. Even worse, a criminal
can use stolen data to assume your identity, run up debts, get into legal difficulties, ruin your credit rating,
and cause you no end of trouble.
What are the risks when I am on my Computer? What can I do to minimize these risks? What is the proper
way to behave when you are online or on our computer?
PRETEST:
To further gauge your level of understanding and where you currently stand in this topic, please answer the
following pre-test questions honestly. Take note of the items that you were not able to correctly answer and
look for the right answer as you go through this module.
HOOK UP ACTIVITY:
The Creeper virus was first detected on ARPANET, the forerunner of the Internet, Creeper was an
experimental self-replicating program written by Bob Thomas. Creeper gained access via the ARPANET and
copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed.
The Reaper program was created to delete Creeper. The reaper is like an antivirus but it was created only to
remove the creeper virus.
STUDY:
                     Today, people rely on computers to create, store, and manage critical information.
                    Thus, it is crucial that users take measures to protect their computers and data from
                    loss, damage, and misuse. A computer security risk is any event or action that could
                    cause a loss of or damage to computer hardware, software, data, information, or
                    processing capability.
        Perpetrators of cybercrime and other intrusions fall into seven basic categories: hacker, cracker,
script kiddie, corporate spy, unethical employee, cyber extortionist, and cyberterrorist.
   o   Hacker, although originally a complimentary word for a computer enthusiast, now has a derogatory
       meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the
       intent of their security breaches is to improve security.
   o   Script kiddie has the same intent as a cracker but does not have the
       technical skills and knowledge. Script kiddies often use prewritten hacking
       and cracking programs to break into computers.
   o   Corporate spies have excellent computer and networking skills and are
GE 10 – LIVING IN AN IT ERA
       hired to break into a specific computer and steal its proprietary data and information. Unscrupulous
       companies hire corporate spies, a practice known as corporate espionage, to gain a competitive
       advantage.
   o   Unethical employees break into their employers’ computers for a variety of reasons. Some simply want
       to exploit a security weakness. Others seek financial gains from selling confidential information.
       Disgruntled employees may want revenge.
   o   Cyber extortionist is someone who uses e-mail as a vehicle for extortion. These perpetrators send an
       organization a threatening e-mail message indicating they will expose confidential information, exploit a
       security flaw, or launch an attack that will compromise the organization’s network — if they are not paid
       a sum of money.
   o   Cyberterrorist is someone who uses the Internet or network to destroy or damage computers for
       political reasons. The cyberterrorist might target the nation’s air traffic control system, electricity-
       generating companies, or a telecommunications infrastructure.
      The common computer security risks include Internet and network attacks, unauthorized access
and use, hardware theft, software theft, information theft, and system failure.
  7. Before using any removable media, scan the media for malware. Follow this procedure even for
  shrink-wrapped software from major developers. Some commercial software has been infected
  and distributed to unsuspecting users.
  8. Install a personal firewall program.
  9. Stay informed about new virus alerts and virus hoaxes.
 2. UNAUTHORIZED ACCESS AND USE is the use of a computer or network without permission.
    Unauthorized Use is the use of a computer or its data for unapproved or possibly illegal activities.
        Organizations take several measure to help prevent unauthorized access and use. At a minimum, they
         should have a written ACCEPTABLE USE POLICY (AUP) that outlines the computer activities for
         which the computer and network may and may not be used. Safeguarding against unauthorized
         access and use also includes identifying and authenticating users.
 2. POSSESSED OBJECT - is any item that you must carry to gain access to a computer or
 computer facility. Examples of possessed objects are badges, cards, smart cards, and keys.
 Possessed objects often are used in combination with personal identification numbers. A
 personal identification number (PIN) is a numeric password, either assigned by a company or
 selected by a user.
   3. BIOMETRIC DEVICES - authenticates a person’s identity by translating a personal
   characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored
   in the computer verifying a physical or behavioral characteristic. Examples of biometric devices
   and systems include fingerprint readers, hand geometry systems, face recognition systems, voice
GE 10 – LIVING IN AN IT ERA
 3. HARDWARE THEFT AND VANDALISM, Hardware theft is the act of stealing computer
    equipment. Hardware vandalism is the act of defacing or destroying computer equipment. Hardware
    vandalism takes many forms, from someone cutting a computer cable to individuals breaking into a
    business or school computer lab and aimlessly smashing computers.
 4. SOFTWARE THEFT occurs when someone steals software media, intentionally erases programs,
    illegally copies a program, or illegally registers and/or activates a program.
    To protect software media from being stolen, owners should keep original software boxes and
     media in a secure location.
    All computer users should back up their files and disks regularly, in the event of theft.
   To protect themselves from software piracy, software manufacturers issue users license
    agreements. A license agreement is the right to use the software. That is, you do not own the
    software. The license agreement provides specific conditions for use of the software, which a
 5. INFORMATION THEFT occurs when someone steals personal or confidential information. Some
    user must accept before using the software.
GE 10 – LIVING IN AN IT ERA
       information theft includes buying or stealing information learn about a competitor and stealing credit
       card numbers to make fraudulent purchase.
    6. SYSTEM FAILURE is the prolonged malfunction of a computer. System failure can cause loss of
       hardware, software, data, or information.
   To protect against electrical power variations, use a surge protector. A surge protector uses special
    electrical components to provide a stable current flow to the computer and other electronic
    equipment.
   For additional electrical protection, some users connect an uninterruptible power supply to the
    computer. An uninterruptible power supply (UPS) is a device that contains surge protection
    circuits and one or more batteries that can provide power during a loss of power. A UPS connects
    between your computer and a power source.
        To protect against data loss caused by a system failure or hardware/software/information theft, computer
users should back up files regularly.
                                               You can use just about any media to store backups such as
                                                eternal hard disks. A growing trend is to use cloud storage as
                                                an offsite location.
                           Users are a key component in any information system. Thus, protecting users is just
                       as important as protecting hardware, software, and data.
GE 10 – LIVING IN AN IT ERA
    The widespread use of computers has led to some important user health concerns. The following sections
discuss health risks and preventions, along with measures users can take to keep the environment healthy.
       A REPETITIVE STRAIN INJURY (RSI) is an injury or disorder of the muscles, nerves, tendons,
   ligaments, and joints. Computer-related RSIs include tendonitis and carpal tunnel syndrome.
       1. Tendonitis is an inflammation of a tendon due to some repeated motion or stress on that tendon.
          Symptoms of tendonitis of the wrist include extreme pain that extends from the forearm to the hand,
          along with tingling in the fingers.
              If untreated, these disorders can lead to permanent physical damage. To reduce the chance of
               developing tendonitis or carpal tunnel syndrome, take frequent breaks during computer sessions
               to exercise your hands and arms.
       3. You may have computer vision syndrome (CVS) if you have sore, tired, burning, itching, or dry
          eyes; blurred or double vision; distance blurred vision after prolonged staring at a display device;
          headache or sore neck; difficulty shifting focus between a display device and documents; difficulty
          focusing on the screen image; color fringes or after-images when you look away from the display
          device; and increased sensitivity to light.
 Eyestrain associated with CVS is not thought to have serious or long-term consequences.
              Following these tips may help reduce eyestrain while working on a computer.
   TECHNIQUES TO EASE EYESTRAIN
   • Every 10 to 15 minutes, take an eye break.
           - Look into the distance and focus on an object for 20 to 30 seconds.
           - Roll your eyes in a complete circle.
           - Close your eyes and rest them for at least one minute.
   • Blink your eyes every five seconds.
   • Place your display device about an arm’s length away from your
GE 10 – LIVING IN AN IT ERA
       4. People who spend their workday using the computer sometimes complain of lower back pain, muscle
           fatigue, and emotional fatigue. Lower back pain sometimes is caused from poor posture.
             To alleviate back pain, muscle fatigue, and emotional fatigue, take a 15- to 30-minute break every
               2 hours — stand up, walk around, stretch, and relax. Another way to help prevent these injuries
               is to be sure your workplace is designed ergonomically.
       Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design
of items in the workplace.
          Ergonomic studies have shown that using the correct type and configuration of chair,
  keyboard, display device, and work surface helps users work comfortably and efficiently and helps
  protect their health. For the computer work space, experts recommend an area of at least two feet by four
  feet.
          A well-designed work area should be flexible to allow adjustments to the height and build of
  different individuals. Good lighting and air quality also are important considerations.
GE 10 – LIVING IN AN IT ERA
 COMPUTER ADDICTION
              Computers can provide entertainment and enjoyment. Some computer users, however, become
       obsessed with the computer and the Internet.
    As with any powerful technology, computers can be used for both good and
bad intentions. The standards that determine whether an action is good or bad
are known as ethics. Computer ethics are the moral guidelines that govern
the use of computers and information systems.
 INFORMATION ACCURACY
              Information accuracy today is a concern because many users access information maintained by
       other people or companies, such as on the Internet. Do not assume that because the information is
       on the Web that it is correct.
               One group that completely opposes any manipulation of an image is the National Press
                Photographers Association. It believes that allowing even the slightest alteration could lead to
                misrepresentative photos.
               Others believe that digital photo retouching is acceptable as long as the significant content or
                meaning of the photo does not change. Digital retouching is an area in which legal precedents
                so far have not been established.
        Intellectual property refers to unique and original works such as ideas, inventions, art, writings,
 processes, company and product names, and logos. Intellectual property rights are the rights to which
 creators are entitled for their work.
 INFORMATION PRIVACY
        Today, huge databases store this data online. Much of the data is personal and confidential and
 should be accessible only to authorized users. Many individuals and organizations, however, question
 whether this data really is private.
 ELECTRONIC PROFILES
                    Every time you click an advertisement on the Web or register software online, your
            information and preferences enter a database. Merchants then sell the contents of their databases
            to national marketing firms and Internet advertising firms.
                           By combining this data with information from public sources such as driver’s
            licenses and vehicle registrations, these firms create an electronic profile of individuals.
                                      They also claim that companies should inform people if they plan to
                              provide personal information to others. Many companies today allow people to
                              specify whether they want their personal information distributed.
 COOKIES
                    A cookie is a small text file that a Web server stores on your computer. Cookie files
            typically contain data about you, such as your user name or viewing preferences.
                    To remove spyware and adware, you can obtain a spyware and adware remover that can
            detect and delete spyware and adware.
           SPAM
GE 10 – LIVING IN AN IT ERA
                Users can reduce the amount of the spam by signing up for e-mail filtering from their
         Internet Service Provider or purchasing Anti-spam programs. Some e-mail programs have
         built-in settings that allow users to delete spam automatically.
                 The disadvantage of e-mail filters and anti-spam programs is that sometimes they remove
         valid e-mail messages.
 PHISHING
               Clickjacking is yet another similar scam. With clickjacking, an object that can be clicked
         on a Web site, such as a button, image, or link, contains a malicious program.
 SOCIAL ENGINEERING
ANALYSIS
           Give your analysis about computer security risk that you encounter or experience in your life. In
           your analysis, include how it affects you and how you resolve it.
GE 10 – LIVING IN AN IT ERA
           If you haven’t experience any computer security risk in your life, you will still give your analysis
    about one computer security risks, how it affects others and possible solution in preventing or stopping
    it.
   For the very first time, I encountered a computer security risk which is the hacker. Last
   2 years ago my Facebook account was hacked by some Vietnamese and I don’t know
   what to do. I panicked and cried a lot because that Facebook account of mine was a
   sentimental value. I was trying to recover my account and I couldn’t do anything. I tried
   to put my number and waited for the code, but the code wouldn’t accept. I saw it very
   quick and try to recover quickly but, the hacker was a snap. The hacker changed
   everything, my e-mail, my number, and they deactivated it. A day after, my significant
   other, told to me to check my e-mail that I used in my account. Upon checking my e-
   mail, I got a message from a Facebook and there’s a code and notify me and indicated
   there the e-mail that the hacker used. In short, my account was recovered, fully
   recovered. It affects me physically and mentally. Well, the good thing in there is I was
   so very conscious in everything, I want everything to be filled up. There’s one thing I
   learned here that you need to activate the “two-factor authentication” because it really
   helps, it helps a lot especially notifying that someone is trying to open your account.
   Not only activating the “two-factor authentication” but filling the important things like
   the primary email address and secondary if that case if you cannot open the primary
   email address you still have the other one. This is a tip, always remember your
   passwords.
              ACTION
GE 10 – LIVING IN AN IT ERA
INFOGRAPHIC HERE:
Put a check on each topic weather you can understand it on your own, need more reference material, or if
you can’t understand at all.
                                           SELF ASSESSMENT
                                                    I can do it with the help
                             I can do it on my own.                              I still can’t understand.
                                                    of a reference material.
 Computer Security Risk
 Health Concern of
GE 10 – LIVING IN AN IT ERA
Computer Use
Ethics & Society
POST TEST:
RUBRICS
Category                          4                        3                       2                    1
Neatness and            The work is              The work is             The work is          The work appears
organization            presented in a neat,     presented in a neat     presented in an      sloppy and
                        clear, organized         and organized           organized fashion    unorganized. It is
                        fashion that is easy     fashion that is         but may be hard to   hard to know what
                        to read.                 usually easy to read.   read at times.       information goes
                                                                                              together.
Understanding           I got it!! I did it in   I got it. I             I understood parts   I did not
GE 10 – LIVING IN AN IT ERA
CLOSING PRAYER
      Shelly, G. B, & Vermaat, M. E. (2013). Discovering Computers: Fundamentals. Boston, MA: Course
       Technology, Cengage Learning
      https://en.wikipedia.org/wiki/Computer_virus
      https://www.vectorstock.com/royalty-free-vectors/hack-vectors
      https://www.privacy.gov.ph/data-privacy-act/#:~:text=%E2%80%93%20This%20Act%20shall%20be
       %20known,Data%20Privacy%20Act%20of%202012%E2%80%9D.&text=%E2%80%93%20It%20is
       %20the%20policy%20of,to%20promote%20innovation%20and%20growth.