SS 3 COMPUTER SCIENCE WEEK 10: SECURITY AND ETHICS


 
-          Definition of computer security

Computer security is the protection of computer components such as hardware, software and data from unauthorized access. The need for computer security is as a result of a number of security breaches.

-          Sources of security breaches

Security breach is an act of breaking security policies, practises or procedures. When security in computer is breached, it may result in the damage of vital file, failure of certain hardware components e.g. keyboard, mouse, printer, hard disk, ram etc, altered software programs etc.
The following are possible sources of security breaches

·         Computer viruses 
·         Hackers 
·         Poorly maintained computer network 
·         Poorly implemented or lack of ICT policy 
·         Carelessness.

-          Computer viruses

A computer virus is an executable program that is capable of replicating itself thereby causing great harm to files or other programs on the computer it infects. A computer can easily spread from in computer to the other with the use of external storage media such as: flash drives, floppy disks and so on it can also be contacted by downloading an infected file from the internet. The two types of computer viruses are WORMS and Trojan Horses.

-          Hackers

A hacker is a clever programmer who tries to break into the computer systems. A hacker understand the weak points in the security system and writes a program that will utilise the system. They are sometimes responsible for writing computer virus codes.

-          Poorly implemented computer network.

A complex computer network may result into poor implementation and management which in turn may give room to intruders who will eventually invade the computer network to steal passwords, confidential files or even infect all the network files. 

-          Poorly implemented or lack of ICT policy

When ICT security policy that controls or maintains the order in which people should conduct themselves when using ICT facilities barely exist due to poor implementation or ignorance, lawlessness will be in place and this can lead to security breach.

-          Preventive measures

Some preventive measures to avoid damages caused by security breaches are presented below:
1.      Use of antivirus software: these are the softwares that are used to prevent the computer from being infected by virus, and if the computer has being infected it can scan the computer, detect the virus, delete it and make sure the computer is healed of its virus infection.

2.      Using firewall: firewalls is a device or set of device designed to permit or deny access of users into a private network based on a set of rules while at the same time permitting legitimate communication to pass.

3.      Encryption: it’s the conversion of data into form that cannot be easily understood by an unauthorised people. And decryption is the process of converting encrypted data into its original form, so that it can be understood.

-          Legal issues
Some computer security issues considered here are
1.      Piracy
2.      Cyber crime
3.      Identity theft
4.      Internet fraud
5.      Hacking.

Assignment
1.      Explain in few sentences from Nos. 1 – 5 the computer security issues listed up there.
2.      The act of breaking security policies, practices or procedures is called ___________?
3.      State e sources of security breaches you know.
4.      Mention 5 good preventive measures against security breaches.
5.      Explain the following terms: piracy, hacking, cyber crime and internet fraud.

Comments

Post a Comment

Popular posts from this blog

JSS 3 WEEK 4: INTERNET (SEARCH ENGINES)

JSS 3 - CHARTS AND GRAPHS

JSS 3 WEEK 7 - 8: HUMAN ISSUE