Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Activity in Living in the IT Era

I.
1. Define e-commerce in your own words.
E-commerce is an online platform that utilizes the internet for marketing. E-commerce is
very easy to use whether it is for selling or buying. People find e-commerce as a very helpful
online platform especially in this time of pandemic. Because of e-commerce, many people
learn to start a small business until it becomes big through posting their product and sharing
it to social media. E-commerce also helps people save time and money from transportation
and other expenses to go shopping. However, as we use online platform like this, we have to
be cautious from fraud and scammers.

2. What are the ethical issues?


The ethical issues faced by Information Technology are the following: Personal privacy
which implies user to have their own hardware and software in order to avoid accidental
disclosure of information to unknown individuals. Access right provides the users to secure
their account from unauthorized access. Harmful actions on the computers can get viruses
and loss of information. Patent on the other hand preserve the unique and secret aspect of
an idea. Copyright law is a legal tool which protects computer software both before and
after a security breach. Trade secret is also a law which protects the private aspects of ideas
which is known only to the discovery or his confidants. Liability issues on making ethical
decision. In making a decision, a user must be practical when they define any claims and
predictions about the capacities, quality and nature of their software or hardware. Every
word they say about their product may be as legally valid as stated in written. All
agreements should be in writing to protect against liability. Piracy is an activity in which
the creation of illegal copy of the software is made.

II. Exercises
1. Discuss the computer security.
Computer security is very important tool on a computer that deals with the protection
of computer systems and information from harm, theft, and unauthorized use. This ensures
the confidentiality, integrity, and availability of your computers and their stored data.

2. Differentiate types of attacks and How do we secure our computer.


There are mostly known attacks like Denial of service. This is an attack used to
restrict the user’s access to the system resources by flooding the server with useless traffic.
Malware attack is a malicious program that disrupts or damages the computer. Wherein
hackers use viruses to damage and steal information from your computer. On the other
hand, Man in the middle is those cyber attackers who spoofs you and monitors your
transaction. Phishing is where the attacker sends bait, often in the form of an email.
Eavesdropping is those kinds of attackers who observe traffic on your system and the work
you are doing. SQL injection vulnerability allows an attacker to inject malicious input into a
SQL statement. This type of attack happens only on websites. Password attack, are those
type of hackers who employs different techniques like dictionary attack, brute force, key-
logger etc. to crack their targets’ password. Social engineering, attackers create social
situations that encourage you to share your password. In securing our computers, we can
used two way authentication which adds a layer of security to the authentication process
by making it harder for attackers to gain access to a person's devices or online accounts. We
also have to secure our password. Creating a much stronger password with the
combination of capital letters and numbers might help. In using our computers, users must
update their software regularly to function well. Users might also install an antivirus to
prevent, detect, and remove malware. Examples of antivirus include Norton, Quickheal, and
McAfee. Firewalls on the other hand prevent unauthorized Internet users from accessing
private networks connected to the Internet, especially intranets. Learn the anti-phishing
tactics. This implies to not just click any link you received. Think before you click. Last is the
encryption, where it is the process of converting ordinary plain text into unintelligible text
and vice-versa.

You might also like