Ge 10 - Living in An It Era: Flexible Dominican Education Module
Ge 10 - Living in An It Era: Flexible Dominican Education Module
COURSE: Ge 10
MODULE NO.: 5
MODULE TITLE: Living in an IT Era
TOPIC: Computer Security, Safety and Ethics
WRITERS: Allan L. Tan & Joshua Mitchell Guan
OPENING PRAYER:
AS WITH MOST OTHER facets of modern life, computing has its share of troublemakers, scam artists, and
identity thieves. The value of a stolen computer is not so much in the hardware as in the data it contains.
With stolen data such as your bank account numbers and PINs, a thief can wipe out your checking and
savings accounts. With your credit card numbers, a thief can go on a spending spree. Even worse, a criminal
can use stolen data to assume your identity, run up debts, get into legal difficulties, ruin your credit rating,
and cause you no end of trouble.
What are the risks when I am on my Computer? What can I do to minimize these risks? What is the proper
way to behave when you are online or on our computer?
PRETEST:
To further gauge your level of understanding and where you currently stand in this topic, please answer the
following pre-test questions honestly. Take note of the items that you were not able to correctly answer and
look for the right answer as you go through this module.
HOOK UP ACTIVITY:
The Creeper virus was first detected on ARPANET, the forerunner of the Internet, Creeper was an
experimental self-replicating program written by Bob Thomas. Creeper gained access via the ARPANET and
copied itself to the remote system where the message, "I'm the creeper, catch me if you can!" was displayed.
The Reaper program was created to delete Creeper. The reaper is like an antivirus but it was created only to
remove the creeper virus.
STUDY:
Today, people rely on computers to create, store, and manage critical information.
Thus, it is crucial that users take measures to protect their computers and data from
loss, damage, and misuse. A computer security risk is any event or action that could
cause a loss of or damage to computer hardware, software, data, information, or
processing capability.
Perpetrators of cybercrime and other intrusions fall into seven basic categories: hacker, cracker,
script kiddie, corporate spy, unethical employee, cyber extortionist, and cyberterrorist.
o Hacker, although originally a complimentary word for a computer enthusiast, now has a derogatory
meaning and refers to someone who accesses a computer or network illegally. Some hackers claim the
intent of their security breaches is to improve security.
o Script kiddie has the same intent as a cracker but does not have the
technical skills and knowledge. Script kiddies often use prewritten hacking
and cracking programs to break into computers.
o Corporate spies have excellent computer and networking skills and are
GE 10 – LIVING IN AN IT ERA
hired to break into a specific computer and steal its proprietary data and information. Unscrupulous
companies hire corporate spies, a practice known as corporate espionage, to gain a competitive
advantage.
o Unethical employees break into their employers’ computers for a variety of reasons. Some simply want
to exploit a security weakness. Others seek financial gains from selling confidential information.
Disgruntled employees may want revenge.
o Cyber extortionist is someone who uses e-mail as a vehicle for extortion. These perpetrators send an
organization a threatening e-mail message indicating they will expose confidential information, exploit a
security flaw, or launch an attack that will compromise the organization’s network — if they are not paid
a sum of money.
o Cyberterrorist is someone who uses the Internet or network to destroy or damage computers for
political reasons. The cyberterrorist might target the nation’s air traffic control system, electricity-
generating companies, or a telecommunications infrastructure.
The common computer security risks include Internet and network attacks, unauthorized access
and use, hardware theft, software theft, information theft, and system failure.
7. Before using any removable media, scan the media for malware. Follow this procedure even for
shrink-wrapped software from major developers. Some commercial software has been infected
and distributed to unsuspecting users.
8. Install a personal firewall program.
9. Stay informed about new virus alerts and virus hoaxes.
2. UNAUTHORIZED ACCESS AND USE is the use of a computer or network without permission.
Unauthorized Use is the use of a computer or its data for unapproved or possibly illegal activities.
Organizations take several measure to help prevent unauthorized access and use. At a minimum, they
should have a written ACCEPTABLE USE POLICY (AUP) that outlines the computer activities for
which the computer and network may and may not be used. Safeguarding against unauthorized
access and use also includes identifying and authenticating users.
2. POSSESSED OBJECT - is any item that you must carry to gain access to a computer or
computer facility. Examples of possessed objects are badges, cards, smart cards, and keys.
Possessed objects often are used in combination with personal identification numbers. A
personal identification number (PIN) is a numeric password, either assigned by a company or
selected by a user.
3. BIOMETRIC DEVICES - authenticates a person’s identity by translating a personal
characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored
in the computer verifying a physical or behavioral characteristic. Examples of biometric devices
and systems include fingerprint readers, hand geometry systems, face recognition systems, voice
GE 10 – LIVING IN AN IT ERA
3. HARDWARE THEFT AND VANDALISM, Hardware theft is the act of stealing computer
equipment. Hardware vandalism is the act of defacing or destroying computer equipment. Hardware
vandalism takes many forms, from someone cutting a computer cable to individuals breaking into a
business or school computer lab and aimlessly smashing computers.
4. SOFTWARE THEFT occurs when someone steals software media, intentionally erases programs,
illegally copies a program, or illegally registers and/or activates a program.
To protect software media from being stolen, owners should keep original software boxes and
media in a secure location.
All computer users should back up their files and disks regularly, in the event of theft.
To protect themselves from software piracy, software manufacturers issue users license
agreements. A license agreement is the right to use the software. That is, you do not own the
software. The license agreement provides specific conditions for use of the software, which a
5. INFORMATION THEFT occurs when someone steals personal or confidential information. Some
user must accept before using the software.
GE 10 – LIVING IN AN IT ERA
information theft includes buying or stealing information learn about a competitor and stealing credit
card numbers to make fraudulent purchase.
6. SYSTEM FAILURE is the prolonged malfunction of a computer. System failure can cause loss of
hardware, software, data, or information.
To protect against electrical power variations, use a surge protector. A surge protector uses special
electrical components to provide a stable current flow to the computer and other electronic
equipment.
For additional electrical protection, some users connect an uninterruptible power supply to the
computer. An uninterruptible power supply (UPS) is a device that contains surge protection
circuits and one or more batteries that can provide power during a loss of power. A UPS connects
between your computer and a power source.
To protect against data loss caused by a system failure or hardware/software/information theft, computer
users should back up files regularly.
You can use just about any media to store backups such as
eternal hard disks. A growing trend is to use cloud storage as
an offsite location.
Users are a key component in any information system. Thus, protecting users is just
as important as protecting hardware, software, and data.
GE 10 – LIVING IN AN IT ERA
The widespread use of computers has led to some important user health concerns. The following sections
discuss health risks and preventions, along with measures users can take to keep the environment healthy.
A REPETITIVE STRAIN INJURY (RSI) is an injury or disorder of the muscles, nerves, tendons,
ligaments, and joints. Computer-related RSIs include tendonitis and carpal tunnel syndrome.
1. Tendonitis is an inflammation of a tendon due to some repeated motion or stress on that tendon.
Symptoms of tendonitis of the wrist include extreme pain that extends from the forearm to the hand,
along with tingling in the fingers.
If untreated, these disorders can lead to permanent physical damage. To reduce the chance of
developing tendonitis or carpal tunnel syndrome, take frequent breaks during computer sessions
to exercise your hands and arms.
3. You may have computer vision syndrome (CVS) if you have sore, tired, burning, itching, or dry
eyes; blurred or double vision; distance blurred vision after prolonged staring at a display device;
headache or sore neck; difficulty shifting focus between a display device and documents; difficulty
focusing on the screen image; color fringes or after-images when you look away from the display
device; and increased sensitivity to light.
Eyestrain associated with CVS is not thought to have serious or long-term consequences.
Following these tips may help reduce eyestrain while working on a computer.
TECHNIQUES TO EASE EYESTRAIN
• Every 10 to 15 minutes, take an eye break.
- Look into the distance and focus on an object for 20 to 30 seconds.
- Roll your eyes in a complete circle.
- Close your eyes and rest them for at least one minute.
• Blink your eyes every five seconds.
• Place your display device about an arm’s length away from your
GE 10 – LIVING IN AN IT ERA
4. People who spend their workday using the computer sometimes complain of lower back pain, muscle
fatigue, and emotional fatigue. Lower back pain sometimes is caused from poor posture.
To alleviate back pain, muscle fatigue, and emotional fatigue, take a 15- to 30-minute break every
2 hours — stand up, walk around, stretch, and relax. Another way to help prevent these injuries
is to be sure your workplace is designed ergonomically.
Ergonomics is an applied science devoted to incorporating comfort, efficiency, and safety into the design
of items in the workplace.
Ergonomic studies have shown that using the correct type and configuration of chair,
keyboard, display device, and work surface helps users work comfortably and efficiently and helps
protect their health. For the computer work space, experts recommend an area of at least two feet by four
feet.
A well-designed work area should be flexible to allow adjustments to the height and build of
different individuals. Good lighting and air quality also are important considerations.
GE 10 – LIVING IN AN IT ERA
COMPUTER ADDICTION
Computers can provide entertainment and enjoyment. Some computer users, however, become
obsessed with the computer and the Internet.
As with any powerful technology, computers can be used for both good and
bad intentions. The standards that determine whether an action is good or bad
are known as ethics. Computer ethics are the moral guidelines that govern
the use of computers and information systems.
INFORMATION ACCURACY
Information accuracy today is a concern because many users access information maintained by
other people or companies, such as on the Internet. Do not assume that because the information is
on the Web that it is correct.
One group that completely opposes any manipulation of an image is the National Press
Photographers Association. It believes that allowing even the slightest alteration could lead to
misrepresentative photos.
Others believe that digital photo retouching is acceptable as long as the significant content or
meaning of the photo does not change. Digital retouching is an area in which legal precedents
so far have not been established.
Intellectual property refers to unique and original works such as ideas, inventions, art, writings,
processes, company and product names, and logos. Intellectual property rights are the rights to which
creators are entitled for their work.
INFORMATION PRIVACY
Today, huge databases store this data online. Much of the data is personal and confidential and
should be accessible only to authorized users. Many individuals and organizations, however, question
whether this data really is private.
ELECTRONIC PROFILES
Every time you click an advertisement on the Web or register software online, your
information and preferences enter a database. Merchants then sell the contents of their databases
to national marketing firms and Internet advertising firms.
By combining this data with information from public sources such as driver’s
licenses and vehicle registrations, these firms create an electronic profile of individuals.
They also claim that companies should inform people if they plan to
provide personal information to others. Many companies today allow people to
specify whether they want their personal information distributed.
COOKIES
A cookie is a small text file that a Web server stores on your computer. Cookie files
typically contain data about you, such as your user name or viewing preferences.
To remove spyware and adware, you can obtain a spyware and adware remover that can
detect and delete spyware and adware.
SPAM
GE 10 – LIVING IN AN IT ERA
Users can reduce the amount of the spam by signing up for e-mail filtering from their
Internet Service Provider or purchasing Anti-spam programs. Some e-mail programs have
built-in settings that allow users to delete spam automatically.
The disadvantage of e-mail filters and anti-spam programs is that sometimes they remove
valid e-mail messages.
PHISHING
Clickjacking is yet another similar scam. With clickjacking, an object that can be clicked
on a Web site, such as a button, image, or link, contains a malicious program.
SOCIAL ENGINEERING
ANALYSIS
Give your analysis about computer security risk that you encounter or experience in your life. In
your analysis, include how it affects you and how you resolve it.
GE 10 – LIVING IN AN IT ERA
If you haven’t experience any computer security risk in your life, you will still give your analysis
about one computer security risks, how it affects others and possible solution in preventing or stopping
it.
For the very first time, I encountered a computer security risk which is the hacker. Last
2 years ago my Facebook account was hacked by some Vietnamese and I don’t know
what to do. I panicked and cried a lot because that Facebook account of mine was a
sentimental value. I was trying to recover my account and I couldn’t do anything. I tried
to put my number and waited for the code, but the code wouldn’t accept. I saw it very
quick and try to recover quickly but, the hacker was a snap. The hacker changed
everything, my e-mail, my number, and they deactivated it. A day after, my significant
other, told to me to check my e-mail that I used in my account. Upon checking my e-
mail, I got a message from a Facebook and there’s a code and notify me and indicated
there the e-mail that the hacker used. In short, my account was recovered, fully
recovered. It affects me physically and mentally. Well, the good thing in there is I was
so very conscious in everything, I want everything to be filled up. There’s one thing I
learned here that you need to activate the “two-factor authentication” because it really
helps, it helps a lot especially notifying that someone is trying to open your account.
Not only activating the “two-factor authentication” but filling the important things like
the primary email address and secondary if that case if you cannot open the primary
email address you still have the other one. This is a tip, always remember your
passwords.
ACTION
GE 10 – LIVING IN AN IT ERA
INFOGRAPHIC HERE:
Put a check on each topic weather you can understand it on your own, need more reference material, or if
you can’t understand at all.
SELF ASSESSMENT
I can do it with the help
I can do it on my own. I still can’t understand.
of a reference material.
Computer Security Risk
Health Concern of
GE 10 – LIVING IN AN IT ERA
Computer Use
Ethics & Society
POST TEST:
RUBRICS
Category 4 3 2 1
Neatness and The work is The work is The work is The work appears
organization presented in a neat, presented in a neat presented in an sloppy and
clear, organized and organized organized fashion unorganized. It is
fashion that is easy fashion that is but may be hard to hard to know what
to read. usually easy to read. read at times. information goes
together.
Understanding I got it!! I did it in I got it. I I understood parts I did not
GE 10 – LIVING IN AN IT ERA
CLOSING PRAYER
Shelly, G. B, & Vermaat, M. E. (2013). Discovering Computers: Fundamentals. Boston, MA: Course
Technology, Cengage Learning
https://en.wikipedia.org/wiki/Computer_virus
https://www.vectorstock.com/royalty-free-vectors/hack-vectors
https://www.privacy.gov.ph/data-privacy-act/#:~:text=%E2%80%93%20This%20Act%20shall%20be
%20known,Data%20Privacy%20Act%20of%202012%E2%80%9D.&text=%E2%80%93%20It%20is
%20the%20policy%20of,to%20promote%20innovation%20and%20growth.