10 Commandments of computer ethics1. Thou shall not use a computer to harm other people2. Thou shall not interfere with other peoples computer work.3. Thou shall not snoop around in other peoples computer files.4. Thou shall not use a computer to steal.5. Thou shall not use a computer to bear false witness.
10 Commandments of computer ethics6. Thou shall not copy or use proprietary software for which you have not paid.7. Thou shall not use other peoples computer resources without authorization or proper compensation.8. Thou shall not appropriate other peoples intellectual output.9. Thou shall think about the social consequences of the program you are writing or the system you are designing.10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.
The information used by an organizationusually originates in one of three ways. It includes;
1. Produced from data collected by the organization.2. Produced from data collected by an outside source.3. Purchased in a pre- processed format from an outside source.
Stages of Procedures to secure Procedures to secure information against accidental damage. against deliberate Processing. intrusion. •Electronic validation. •Password access to equipmentData Entry •On-screen reminders of security and files. procedures. •Knowledge and verification of source data. •Program testing. •Program testingProcessing •Matching to template. •Matching run times; if a •Check digit in the binary code, program takes longer than known as a ‘parity bit’. expected it may have been caused by an intrusion. •Random proofreading, as in •Logging of every outputInformation newspaper attempt Output •On-screen reminders about saving •Password access to output files devices. •Read only files where appropriateCommunication •Clear, dated source identity •Encryption of information •Verification of destination identify •Logging destination addresses before transmission. •Logging the terminal address used to communicate the info.
Protecting the integrity of data Methods of Methods of Method of securing the protecting the guaranteeing the information products integrity of data software processesPassword access Regular file matching Password access toto terminal that guard against editing functions. hacker entry to a system.ID location badge Virus detection Read-only files wherefor staff using programs that run at possiblecash register critical events in the program.Biometric identify Encryption downloadsuch as fingerprint with scan.and iris scan
Regular Back-Ups In organizations where staff are using computers at the desktop for a range of tasks during the day, autosave is only one part of back-up procedures used to secure information.
Additional Back-upprocedures includes;1. screen messages instructing operators to back-up work on a floppy disk when a tasks is completed.2. automatic log-out and save after 10 minutes of inactivity.
Additional Back-upprocedures includes;3. saving and printing controlledcopies of files required forproofing or by a reference group.4. saving all files and folders onthe network to a tape, disk,cartridge, etc. which is thendated and locked in a securefireproof cupboard.
File AccessRestrictions Passwords are playing important role incontrolling the security ofinformation produced by organization.
File Access RestrictionsFeatures include:• structure of hierarchy• allocation• duration
BOSS Staff Financial Stock Manager Manager Manager StaffRosters Accounts Payroll Orders Advertising Records
Security for information communicatedInformation produced electronically byan organization can be communicated viarange of media that includes; Cable Disk/CD-ROM Internet/e-mail Graphics microwave
Procedures toprotect informationcommunicated by an organization• newspapers need classifiedadvertisements with correctphone and price details.• libraries need an up-to-date listof all titles available to borrowers.