User talk:Permit himash

Welcome!
Hello, Permit himash, and welcome to Wikipedia! Thank you for your contributions. I hope you like the place and decide to stay. Here are a few links to pages you might find helpful:
 * Introduction and Getting started
 * Contributing to Wikipedia
 * The five pillars of Wikipedia
 * How to edit a page and How to develop articles
 * How to create your first article
 * Simplified Manual of Style

You may also want to take the Wikipedia Adventure, an interactive tour that will help you learn the basics of editing Wikipedia. You can visit The Teahouse to ask questions or seek help.

Please remember to sign your messages on talk pages by typing four tildes ( ~ ); this will automatically insert your username and the date. If you need help, check out Questions, ask me on my talk page, or, and a volunteer should respond shortly. Again, welcome! CAPTAIN RAJU ( ✉ ) 19:42, 29 February 2016 (UTC)

The safety and security, copyright issues, and reliability of information in ict
SAFETY AND SECURITY IN ICT

There are many threats to ICT systems and can be broken into two categories; internal and external threats.

Examples of internal threats include:

Hardware failure Faulty procedures Disclosure of passwords Examples of external threats include:

Hackers Viruses Malware

virus_fg_technology_hd-wallpaper-15017 A computer virus is a computer program that can replicate itself. And spread from one computer to another. The term “virus” is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers. To stop the risk of getting virus by preventing any unauthorized software being installed onto a machine, preventing files being downloaded from the internet, ensuring portable storage devices from an outside source are not used, ensuring emails from unknown email are not opened, installing and running virus scanning software, and by keeping the virus scanning software up to date.

Hacking is any technical effort to manipulate the normal behaviour of network connections and connected systems. A hacker is any person engaged in hacking. The term “hacking” historically referred to constructive, clever technical work that was not necessarily related to computer systems. Today, however, hacking and hackers are most commonly associated with malicious programming attacks on the internet and other networks. You can avoid being hacked by not leaving your computer on or not be telling anyone your passwords.hakeri_v

Not all incidences of data loss from ICT systems are a result of illegal practices. There is the problem of malpractice. For example, an employee who cannot remember their password and who decides to use a sticky note stuck to their computer screen acts in an unprofessional way. They are leaving their computer account open to hackers. Another form of malpractice is to allow employees access to cd drives or USB pens so they can bring in software from home, this software will be unchecked and, therefore, may carry malware. Malpractice is acting in an unprofessional way; it is not against the law but is against regulations set by the company

Putting strict procedures in place so that the sensitive data they hold is protected. These can include; physical restrictions (swipe cards, servers in locked room etc.), user names and passwords, user groups and access privileges, audit trail software, data scrambling using encryption, data backup, careful vetting of staff, training staff, installing virus scanners, installing a firewall, uninterrupted power supply, internet filters

COPYRIGHT

The copyright legal act gives the author of certain types of material rights to control the use or commercial exploitation of the work that he or she has created. This includes rights to authorize or prohibit the copying, issuing of copies, renting or lending, performing, showing, playing, broadcasting or adaptation of the copyright material.

Copyright allows the owner, and the owner alone, to copy, issue copies, rent or lend, perform, show, play, communicate or adapt the copyrighted work.

copyright

Ideas are not protected by copyright. Copyright will only protect the textual or literary expression of ideas rather than the ideas themselves. Names, titles and internet domain names also do not attract copyright. These can, however, be protected in other ways, for example by a registered trademark or a common law action to prevent passing-off. Logos may be protected under copyright as artistic works.

A copyright owner may mark copyright material when it is published with the international copyright symbol © followed by the name of the copyright owner and year of publication. This is not essential in the UK, but may assist a copyright owner in the event of infringement proceedings. It will also be necessary if a copyright owner wishes to enforce his or her copyright in certain foreign countries.

Copyright is a property right which, like rights in physical property, can be bought or sold, inherited or otherwise transferred, either wholly or in part. Copyright may therefore subsequently belong to someone other than the author of the protected work. Copyright owners may choose to license others to use protected works while retaining ownership themselves.

RELIABILITY OF INFORMATION

Reliability refers to the repeatability of findings so that you can trust its reliability. If the study were to be done a second time, would it produce the same results? If so, the data will be reliable. Because you would intend to trust something if it was presented the second time round mostly because if something changes again and again constantly never stationary, this thing would be considered not trustworthy and not reliable.

When people are searching online for information they often simply accept the first few sites brought up on a search made using Google or another search engine. But unfortunately, not all information found online is accurate. Web pages may be written by someone with little or no knowledge of the subject area, they may be designed to encourage you to buy a specific product or they may be biased in favour of someone’s opinions, whether or not these reflect the facts.

Wikipedia Major information sites like Wikipedia are generally accurate when dealing with factual or technical subjects, including Computing topics, but they may be less accurate when dealing with subjects where opinions play an important role, for example, current or historical events or political topics.

You should always evaluate the quality of information found on website using five criteria:


 * Scope of Coverage: to what extent does the site explore the topic?
 * Authority: does the information come from a source which is known to be reliable?
 * Objectivity: does the site cover a range of views, or does it simply express the author’s bias or opinions?
 * Accuracy: is the information correct? How has this been checked? Can the same information be obtained from other sources?
 * Timeliness: is the information current, or was it published some time ago? When was the website last updated?

BY HASHIM ABDULAHI