mod 1.6 :the dark side of computing Flashcards
what are errors and failures of computer systems caused by
- Bad programming
- poor Training
- Poor procedures
errors and failures usually leads to inaccurate information. This leaves a devastating effect on?
trust, decision making, product quality
what causes a breakdown in user’s trust ?
if a computer system repeatedly produces errors, then the users of the system will begin to lose their trust in the system causing many consequences
what are the consequences of of the breakdown in the user’s trust
- decrease in efficiency- repeated failures leads to delay as people put off doing their work or they need to redo their work because the system failed
- reduced morale or motivation- people begin to feel that the ‘computer’ is going to mess up their work anyway , so why bother to work hard, efficiently and accurately?
- Increased workload- people start to create
the main reason for a computer systems
to process large amounts of data into information
what happens if people do not trust the information
people can and will delay making decision , which can cost money or lives.
Inaccurate information can also easily lead to the wrong decision being made
why is that there is no guarantee that any given piece of information you are presented with is correct
people who use information need to learn vital skills for analysing,interpreting and judging the quality of information. The information age creates the freedom for anyone to publish anything with ease therefore people can use information as a criminal tool
how one can protect their data
+ controlling access to physical data
+ control access to computers
+ limiting and restricting use f portable storage
protecting data by controlling access to physical data
it does not help even with the most secure computer system and and digital data in the world - if someone can just walk into ur office and help themselves to paper records and backup media
protecting data by controlling access to computers
- keep computers with valuable information in looked rooms and control access to the room
- make sure that the computer requires a login when starting and waking from screensaver mode
- make sure that the computer does not have unrestricted access to the internet
- also ensure that not just any device can make a bluetooth connection to your device
protecting data by limiting and restricting use of portable storage
control what portable storage people get to use on your computers. it does not matter what encryption you have if someone can copy your documents and take it away to another place
what is social engineering
is manipulating people to get access to their 4,data or their physical computers or premises
what is the goal of social engineering
the use of basic human emotions and failings such as fear or greed or optimism to get access to either ur secrets, your data or your physica computers or premises
example of social engineerings tricks in phishing, emails and scams
- tellingu that u have won the lottery
- offering you a business opportunity
- telling u there is a problem with your online banking details
the best protection against social engineering
+ remember ‘ if it sounds too good to be true, then it probably is’
+ know the people u work with and don’t trust strangers around data
+ THINK before u act