COMPUTER SECURITY Grade 10
COMPUTER SECURITY Grade 10
COMPUTER SECURITY
CHONGO MK MARIO
AND
CHONGO MK MARIO
TERMINOLOGY
WHAT IS A SECURITY POLICY?
▪System Security policy is a policy that formally describes
how the organisation deals with security issues.
▪It stipulates the responsibilities of the organisation and its
employees.
▪It sets expectations for the conduct of their staff or
members on the computer system or network and lists
security measures and procedures that have to be followed.
CHONGO MK MARIO
WHY IS SECURITY POLICY
NECESSARY?
▪The physical computer equipment and infrastructure
need to be protected against abuse, damage and theft.
▪The organisation data is stored on the computer system
must be protected.
▪Personal information about clients and business must be
protected
CHONGO MK MARIO
SECURITY POLICIES
▪Acceptable use policy
▪Password protection policy
▪E-mail policy
▪Software installation policy
▪Web access policy
CHONGO MK MARIO
▪Disaster recovery policy
▪Data backup policy
▪Data encryption policy
▪Workstation protection policy or physical
resources protection policy
▪Privacy policy
CHONGO MK MARIO
ACCEPTABLE USE POLICY
CHONGO MK MARIO
PASSWORD PROTECTION POLICY
CHONGO MK MARIO
SOFTWARE INSTALLATION POLICY
CHONGO MK MARIO
E-MAIL POLICY
CHONGO MK MARIO
WEB ACCESS POLICY
CHONGO MK MARIO
DATA ENCRYPTION POLICY
CHONGO MK MARIO
PRIVACY POLICY
CHONGO MK MARIO
EXERCISE
(a)Teachers at St Clement’s secondary have to go through
logon procedure to gain access to the school computer
system.
(i) Which policy is responsible for protecting their passwords?
(ii) which policy specifies the protection of teacher’s personal
information?
(b) State two reasons why it is important to have a security
police at school
CHONGO MK MARIO
SECURITY CONCERNS
CHONGO MK MARIO
▪Hardware failure
▪Accidental damage of critical data through human error
▪Disasters such as flood, fires and earthquakes
▪Computer viruses
▪Unauthorised access to the system
▪Theft of data and hardware
▪Loss of data on the memory sticks and external hard disks
CHONGO MK MARIO
HARDWARE FAILURE
CHONGO MK MARIO
DISASTERS
▪Disasters such as storm damage, lightning
strikes, fires, floods and earthquakes can
completely destroy a computer system.
▪A complete disaster recovery is required, this
includes backup of all data offsite.
▪Cloud computing is needed
CHONGO MK MARIO
EXERCISE
Computer systems can be affected in various ways
which could lead to data corruption.
(a)Give two ways that data might be corrupted.
(b) Suggest the method of protection.
(c)How is a password verified?
CHONGO MK MARIO
COMPUTER VIRUSES AND SIMILAR THREATS
▪Computer viruses fall into a larger category called
malware.
•A malware is any computer program that is unwanted
and that has installed on a computer without the
permission of the user, usually to perform a non-
beneficial activity.
CHONGO MK MARIO
COMPUTER VIRUSES
▪A computer virus is a small computer program that
has been written to cause damage to computer files or
data.
▪They are executable programs that attach themselves
to a program or file and are then spread from
computer to computer infecting more and more over
CHONGO MK MARIO
time.
COMPUTER WORMS
▪A computer worm is different from a virus as it does not
attach itself to a particular file.
▪It is able to duplicate itself and spread easily through a
network and via e-mail.
▪It does damage to a computer system by using all
available bandwidth or by rewriting data to use for
negative activity and slows down network activity.
CHONGO MK MARIO
TROJAN HORSE
▪It appears to be a useful software, but once
installed on a computer the program does
damage to the system.
▪It compromises the security of the computer by
allowing unauthorised access to the computer
system.
CHONGO MK MARIO
network.
EXERCISE
CHONGO MK MARIO
SECURITY PROFESSIONALS
▪ A computer security policy must be developed by the management of the organisation.
▪ IT staff must be involved to inform decision makers of what is possible given structure of
the particular system and the facilities available.
▪ The chief security officer is responsible for overall security system in an organisation.
▪ Network administrator looks on the security of the network.
▪ Hackers to test for weak points in their security systems.
▪ Computer crime investigator
▪ Disaster recovery experts
▪ Anti-virus and anti-spyware software developer
CHONGO MK MARIO
EXERCISE
• To gain access to a database, a user must type first in the user ID and then
a password which needs to be verified.
(a)What is data verification?
(b)In spite of these safeguards, unauthorised access to the database is still
possible. What could be done:
(i) to prevent data being used by unauthorised people?
(ii) to prevent data loss once illegally accessed?
(c) Suggest two possible backup devices that can be used to store data
(d) State two security professional that can help in computer security.
CHONGO MK MARIO
+260 969 413 288
CHONGO MK MARIO
REFERENCE
CHONGO MK MARIO