Monday, September 12, 2016

Concept Paper By: Jherald Arizabal, Rhealyn Torres and Erien Roen domondon

“Applications of computers in SECURITY and PRIVACY”
By: Jherald Arizabal, Rhealyn Torres and Erien Roen domondon

A computer is a device that can be instructed to carry out an arbitrary set of arithmetic or logical operations automatically. It has an ability to follow sequence of operations called program. Most of the computer is used as a control system. It includes simple but special purpose devices like “Microwave” ovens and remote controls. The internet runs in the computer to connects other millions computer.

Computer word derived from “Computing”. As the start of the modern science that we call “Computer Science” can be tracked back to a long ago age where man still dwelled in caves or in the forest, and lived in groups for protection and survival from the elements on the Earth. In ancient period a manual device like the Abacus aided people in doing calculations. The first digital electronic calculating machines were developed during World War II. The speed, power, and versatility of computers increased continuously and dramatically since the point of possible artificial intelligence in the near future.

Microcomputers came along and changed everything. Today it is easy for nearly everybody to use a computer. Now, the microcomputers are common tools in all areas of life. Writers can write, artist can draw engineers and scientists, can calculate, because of the computers, students and business people do all this and more.
Computer may entertain us by watching playing and surfing social media also we can use it to improve the education by surfing or searching information about the things you can want to know. Computer may also help us to search for the remedies in order to avoid the disease.

Electronic devices are having a big part to our lives today specially to our privacy and security and it’s hard to imagine what we once did without it. Constant use of technology will keep in touch in paying bills, staying on the top of the new, shopping and researching things. Growing reliance on electronic devices is part of the reasons why careers in cyber security are growing at faster pace. Understanding threats can help everyone do their part to make those jobs easier.

Here are the different Threats to our security using the computers. You already know that the SPAM is equivalent of junk man some of these emails missives contain a link or an attachment to prompting you to download computer viruses. For instance, someone who hacked into your email account  can send a message asking one of your contacts to wire money up to protect consumers from deceptive email messages, subjecting senders to fines of up to 16,000 US dollar per colorations. Hacked Accounts, One of the common ways for identify thieves to gain control of consumer’s personal information through digital crimes known as phishing. In this practice, fraudsters create an email that looks like it was issued from a legitimate company. That will ask for a recipient’s personal information- like an account number or password- and then use that information to commit financial crime, such as opening fraudulent charge cards in a consumer’s name and running up big bills on them.
Given all of these places where tote mobile devices such as laptops, tablets and mobile devices. It can be a field day for cybercriminals. 45% percent of data breaches at companies are caused by lost laptops and mobile devices.
There are also an online privacy threats. The Behavioral targeting, your internet services provider (ISP) has an access to go online control and combined with third party cookies gathering information about your behavior. Whiter it’s real or imaginary. Lots of privacy disturbs people. If the advertising industries would give its customers choices, control and transparency into its tracking and profiling in gaining customers trust. Cloud Computing, concept of huge date which operate the networking infrastructure known as “the cloud”, stuff is stored on someone’s servers accessed via internet. For instance your Gmail; your photos on flicker. It has a responsibility which protects the information from hackers. The Cookies, cookies are online files that can be used for authenticating your session tracking. One example is by logging in your ID email account so that you don’t have to login to each page. 

The purpose of it is it makes the users to easily access, login and deliver their precise.
Phishing, cyber criminals use “phishing” or email scams, to bait people with legitimate looking request from what appear to be reliable sources. Bad guys use sneaky social engineering with the aim to collect personal information-social security numbers password and pin numbers- that can be use to access bank and credit card accounts, resulting in stolen funds and identify theft. Spyware and adware, these apps can be programs, cookies or registry entries that secretly gather information about your online activity. This class of advertising methods is considered unethical and perhaps even illegal. Often these applications are disguised as a simple service like a search bar and some of them can be malicious, open dangerous security holes and lead to frequent crashes or hangs.

Threats in security using the social media. Having your identity stolen, identify thieves gather personal information from social media sites. Most social networks sites have information that is required, such as email address or birthday. It’s common form an identity thief to hack an email account by using social information. Getting your computers or social profile hacked, hacker’s love social networking, going right to the source to interject malicious code. The codes hackers use can steal your identity. Inject viruses to your computers, and obstruct account information to have a few. Being Overconfident, one of the biggest threats to online security is overconfidence. Whether at home or at work, many users believe as long as they have a firewall and an antivirus installed, there is no threat to security. With today’s technology, we are more connected to each other than ever before. When you reflect security, you not only put yourself at risk, but others are at risk as well.

Having cyber security helps you to protect system against viruses and other unwanted, also to protect the computer and data from being hacked and lastly it minimized crashes on computer and it gives privacy to users. Prevention of data theft such as bank account numbers, credit card information, passwords, work related documents or sheets, etc. is essential in today’s communications since many of our day to day actions depend on the security of the data paths. 
Data present in a computer can also be misused by unauthorized intrusions. An intruder can modify and change the program source codes and can also use your pictures or email accounts to create derogatory content such as pornographic images, fake misleading and offensive social accounts. Malicious intents can also be a factor in computer security. Intruders often use your computers for attacking other computers or websites or networks for creating havoc. Vengeful hackers might crash someone’s computer system to create data loss. DDOS attacks can be made to prevent access to websites by crashing the server. 
Above factors imply that your data should remain safe and confidential. Therefore, it is necessary to protect your computer and hence the need for Computer Security arises.

But with that advantage also there are disadvantages of having a cyber security like it makes the system slower than before, firewalls can be difficult to configure correctly, incorrect configuration of firewalls may block users from performing certain actions on the internet and lastly it could be costly for average user.

Those are some Computer and Digital gadgets that can help to our Security and privacy. Saxby Security Light, This outdoor security light is designed to send out a dazzling glare whenever it's activated by its PIR (passive infrared) sensors. A great addition for anyone who has a shady doorway, as well as improving security, it will definitely help you find your keys at night. Dummy camerafar cheaper than a real CCTV set-up, dummy cameras can still is an effective deterrent to troublemakers. Made from a real camera housing containing a genuine camera body and lens, this model should bear up to close scrutiny. Barking dog alarm, for the Rottweiler effect, but without the bite marks, this is the perfect device. Once triggered, the alarm gives out the sound of a vicious guard dog that should send burglars scarpering. With a 360-degree radar detector, the alarm is effective even through walls. Siren Padlock, if a lock won't do it, perhaps a lock with a built-in alarm will. The heavy-duty padlock can be used for sheds, cupboards, crates or cycles, and the alarm will be activated if the lock is touched, moved, or knocked, hopefully giving potential thieves a scare.

Also we have now digital Internet Privacy Gadgets. Like Nope Magnetic Privacy Shieldnope features two small circular magnets, one of these small magnet attaches to the side of your camera, while the other is designed to revolve around it. It can be used to cover the camera when you want privacy and simply turn it the other way when you want to use the camera. It’s a simple and elegant magnetic privacy shield for iMacs, Mac books, laptops, and desktops. ITwin Connect, the iTwin Connect is a tiny USB device that features two identical halves. To use it, you need to detach them and plug one end into your home or office notebook; while the other half 'key', can be taken along anywhere you go. When you want to browse, you need to plug the key into the computer you are using to create a secure VPN (virtual personal network) tunnel to the home or office notebook.


The computers are having a many application to our lives, especially to our security and privacy. Technology can have a negative effects or good based on how we use it. But still technology may have good effects especially to our security and lives; we can make our jobs or whatever we do. We can protect are selves from the different threats to our security and privacy by using the computer and digitalize gadgets like Nope Magnetic privacy shield, siren padlock, barking Dog alarm, dummy camera, and Saxby security light. I hope those digital gadgets are being helpful to us.



References:
            A. The computer knowledge book
                        By: Tokunbo Osilaja, B.SC, and M.I.S
            B. Computing today
                        By: Timothy J O’Leary and Linda I O’Leary
            C.Www.studymode.com
            D.Chanrad.blogspot.com

 Reference websites.
http://www.independent.com
.uk/life-style/gadgets-and-tech/features/the-10-best-security-gadgets-8884881.html


2 comments: