https://za.pinterest.com/timekajansenjoy/pins/
DIGC5110 POE
Tuesday, 31 May 2016
Task 7
Question
7
The top 5
cyber security risks in South Africa:
- Hacktivism
- Cyber theft
- Financial cyber crime
- Mobile matters
- Zero-second matters
With many
users on the net we don’t always pay attention to detail and often get
exploited by these convincing hackers. It is so easy to be misled by a hacker
an in doing this one could loses all his/her hard earned money or even
identity. By not checking the page and just filling out ones’ information, we
are giving access to those hacking in to our accounts. Or if users do not put
passwords on their personal details or don’t update their passwords, this makes
it easy for hackers to get into their information.
To avoid
hackers from obtaining these personal information, users should check the URL and
if there is a lock on it and that it starts with http. Users need to constantly
update their passwords, update their anti-virus as well as double check the
mail recipient to make sure that its not spam.
task 4
Digital code
of conduct:
Accessing
the internet is at ones’ own risk. This code of conduct are guidelines for
ones’ own safety. The user will adhere to these guidelines as they are crucial
to the reputation that we uphold, and anyone who disobeys and abuses the use of
the computer facilities will be held accountable and severely prosecuted.
10 points of
netiquette
- Make yourself look good online
- Respect other people’s time and bandwidth
- Share expert knowledge
- Help keep flame wars under control
- Respect other peoples’ privacy
- Don’t abuse your power
- Be forgiving for other peoples’ mistakes
- Remember the human
- Know where you are in cyberspace
- Adhere to the same standards of behaviour online that you follow in real life
The
Penalties of not adhering to these guidelines:
- 1st attempt is a warning for the hacker to adhere to the customs and regularity of the rules.
- 2nd attempt is a fine which could vary in price and can be a hefty price to pay for the hacker trying to abuse information and send it to the general public.
- 3rd attempt is prosecution if the mentioned above is not met and respected and this consequence can take a matter of years.
From a
business perspective, I would add it in my code of conduct and furthermore
incorporate it into my vison statement resulting in a good technological
standard. A system will be connected to the student computers and will alert the
officials if any rules were broken or if the code of conduct was violated the
student on that computer will be held accountable.
references:
DIGC5110 manual guide book
Task 2
Q.2.1 Homo Naledi is an extinct species
discovered by “cavers Rick Hunter and
Steven Tucker in 2013 and Homo Naledi was formally described in
September 2015 by a team of 47 led by American and South African
paleoanthropologist Lee Berger from
the University of Witwatersrand” (Wikimedia Foundation, Inc., 2015).
“On
September 13, 2013 while in the Rising Star cave system, whilst looking for an
extension, cavers Rick Hunter and Steven Tucker of the Speleological
Exploration Club of South Africa found a narrow chimney or chute which measured
12m” (Wikimedia, Foundation, Inc.,2015). This chute led to a room approximately
30m underground, in which the surface was shattered with fossil bones. Upon
entering the cave, the cavers Rick Hunter
and Steven Tucker knew a fellow scientist
from Johannesburg who was also searching for fossils.
The National
Geographic society and the University of Witwatersrand collaborated and funded
an expedition called the Rising Star expedition that lasted for 21 days in the
month of November. In March 2014 a second expedition was launched by the same
team that lasted around 4 weeks in the Dinaledi chamber.
The Homo
Naledi and the Homo sapiens species are very similar in resemblance, however
the Homo Naledi is an older species, they are smaller in size, the male
reaching approximately 5 feet in length and the female smaller. Other Features
of the Homo Naledi is that they have curved fingers and a small skull.
Referencing:
Subscribe to:
Posts (Atom)