Posts

Showing posts from March, 2018

Two laws or guidelines

1.       You are not allowed to interfere with the work of other users on the network or with their host systems or that seriously disrupts the network or that result in the loss of a user's work or system. 2.       You are not allowed to do malicious or unethical including assessment of other people over the internet or disseminating material which violates the copyright or other intellectual property rights of others which violate federal, provincial or copyright laws.

Three safety and security precautions

1.       Using Virus-checking and anti-spam software to scan PCs and prevent unauthorised access to computer. 2.       Enable Firewall when using Internet to prevent hackers or malicious programs from gaining access to the computer. 3.       Treat messages, files, software and attachments from unknown sources with caution.

Three threats to system performance, information security and user safety

Unwanted e-mail (often referred to as “spam”) - Spam is most often considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email.  Username and password/PIN should be selected and managed properly to avoid easy disclosure of such information. It should not be kept in places where everyone can get access that is should be kept secret Malicious programs (including viruses, worms, Trojans, spyware, adware and rogue diallers) - Malicious programs is software used or programmed by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. This class includes viruses, worms, Trojans, and other programs used to automatically conduct malicious activity