Академический Документы
Профессиональный Документы
Культура Документы
Etika (Ethics)
Etika komputer adalah sistem berkaitan standard moral atau nilai yang digunakan sebagai panduan bagi pengguna komputer. Ethics in computing means moral guidelines to refer to when using the computer and computer networks.
Undang-undang (Law)
Undang-undang siber menerangkan mengenai isu-isu undang-undang berkenaan dengan penggunaan teknologi maklumat antara rangkaian. Cyber law refers to all areas in law that requires on understanding of computer technology such as hardware, software and internet.
Untuk mengawal pengguna komputer daripada menyalahgunakan komputer. Untuk menghasilkan masyarakat komputer yang sihat. Untuk mengelakkan berlakunya jenayah komputer.
Both ethics and law are complementary to each other and are made:
To guide user from misusing computers To create a healthy computer society. So that computers are used to contribute to better life To prevent any crime
Hak milik intelektual merujuk kepada kerja yang dibuat oleh pencipta seperti artis, pembuat program dan sebagainya. Refers to works created by inventors, authors and artists.
Privasi
Keupayaan seseorang untuk mengelakkan maklumat mereka daripada diketahui oleh orang lain. Privasi IT merujuk kepada privasi data and informasi Privasi dapat dilindungi oleh:
Privacy
is the ability of an individual or group to stop information about themselves from becoming known to people other than those whom they choose to give the information. Privacy in IT refers to data and information privacy Privacy can be protected by:
(B) Perisian Utiliti - Menginstall program Anti Spam, Dinding Api (firewall), Anti Perisik dan Antivirus - Membeli barangan secara tunai - Menghilangkan sejarah carian internet apabila selesai melayari internet - Hanya mengisi perkara yang perlu dalam borang internet.
Authentication
Is a process where users verify that they are who they say they are Two common methods of authentication:
Verification
Is the act of proving or disproving the correctness of a system with respect to a certain formal specification. Two common methods of verification: