SS 3 COMPUTER SCIENCE WEEK 10: SECURITY AND ETHICS
-
Definition of computer security
Computer
security is the protection of computer components such as hardware, software
and data from unauthorized access. The need for computer security is as a
result of a number of security breaches.
-
Sources of security breaches
Security breach is an act of
breaking security policies, practises or procedures. When security in computer
is breached, it may result in the damage of vital file, failure of certain
hardware components e.g. keyboard, mouse, printer, hard disk, ram etc, altered
software programs etc.
The following are possible
sources of security breaches
· Hackers
· Poorly maintained computer network
· Poorly implemented or lack of ICT policy
· Carelessness.
-
Computer viruses
A computer
virus is an executable program that is capable of replicating itself thereby
causing great harm to files or other programs on the computer it infects. A
computer can easily spread from in computer to the other with the use of
external storage media such as: flash drives, floppy disks and so on it can
also be contacted by downloading an infected file from the internet. The two
types of computer viruses are WORMS and Trojan Horses.
-
Hackers
A hacker is a
clever programmer who tries to break into the computer systems. A hacker
understand the weak points in the security system and writes a program that
will utilise the system. They are sometimes responsible for writing computer
virus codes.
-
Poorly implemented computer network.
A complex
computer network may result into poor implementation and management which in
turn may give room to intruders who will eventually invade the computer network
to steal passwords, confidential files or even infect all the network files.
-
Poorly implemented or lack of ICT policy
When ICT
security policy that controls or maintains the order in which people should
conduct themselves when using ICT facilities barely exist due to poor
implementation or ignorance, lawlessness will be in place and this can lead to
security breach.
-
Preventive measures
Some preventive
measures to avoid damages caused by security breaches are presented below:
1.
Use of
antivirus software: these are the softwares that are used to prevent the
computer from being infected by virus, and if the computer has being infected
it can scan the computer, detect the virus, delete it and make sure the
computer is healed of its virus infection.
2.
Using firewall:
firewalls is a device or set of device designed to permit or deny access of
users into a private network based on a set of rules while at the same time permitting
legitimate communication to pass.
3.
Encryption: it’s
the conversion of data into form that cannot be easily understood by an
unauthorised people. And decryption is
the process of converting encrypted data into its original form, so that it can
be understood.
-
Legal issues
Some computer security issues considered
here are
1.
Piracy
2.
Cyber crime
3.
Identity theft
4.
Internet fraud
5.
Hacking.
Assignment
1.
Explain in few
sentences from Nos. 1 – 5 the computer security issues listed up there.
2.
The act of
breaking security policies, practices or procedures is called ___________?
3.
State e sources
of security breaches you know.
4.
Mention 5 good
preventive measures against security breaches.
5.
Explain the
following terms: piracy, hacking, cyber crime and internet fraud.
I really appreciate it.
ReplyDeleteThanks sir.
A very good note of lesson. Thank you Sir
ReplyDelete