0% found this document useful (0 votes)
127 views6 pages

UNIT 5 Ict Grade 10 Shortnote

The document provides an overview of information and computer security, emphasizing the importance of protecting computer systems and data from unauthorized access and threats such as viruses and hackers. It discusses various security measures, including technical strategies like firewalls and antivirus software, as well as non-technical strategies for safeguarding data. Additionally, it highlights the significance of privacy and data security in managing personal information and preventing data breaches.

Uploaded by

Esku Lulu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
127 views6 pages

UNIT 5 Ict Grade 10 Shortnote

The document provides an overview of information and computer security, emphasizing the importance of protecting computer systems and data from unauthorized access and threats such as viruses and hackers. It discusses various security measures, including technical strategies like firewalls and antivirus software, as well as non-technical strategies for safeguarding data. Additionally, it highlights the significance of privacy and data security in managing personal information and preventing data breaches.

Uploaded by

Esku Lulu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Abadir Secondary School ICT Handout

U NIT 5
INFORMATION AND COMPUTER SECURITY

5.1 Unit Overview

Security also means protection and measures taken to guard against sabotage, crime, attack or escape.

Security is the quality or state of being secure.

Computer security is the protection of computer systems and information from harm, theft and
unauthorized use.

Computer security is also the process of preventing and detecting unauthorized use of your computer
system.

Computer viruses can corrupt and damage computers. Viruses can also open security breaches on a
computer that allows yet another threat, hackers, into the computer system.

5.2 Information and Computer Security

Information Security
Information security is simply referred to as InfoSec, which is the practice of defending information
from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or
destruction.
Computer Security
Computer security, also known as cyber security, is about information security as applied to computing
devices such as computers and smartphones as well as computer networks such as private and public
networks including the whole Internet. It is a method for ensuring data that has been stored in
computer systems could not be read or compromised by any individuals without authorization.
Traditionally, information technology (IT) facilities have been protected for three reasons:
ƒ To prevent theft of or damage to the hardware.
ƒ To prevent theft of or damage to the information.
ƒ To prevent disruption of service.
5.3 Impact of Information and Computer Security on Society

Information and computer security risks arise from the intentional or unintentional misuse of computers
and network resources as well as the Internet. These risks may result in the loss of or damage to
computer hardware, software, confidential information and data integrity as well as network and
Internet availability.
Hackers can do several things from stealing your passwords to controlling your computer through
remote access. A Hacker is a person who uses computers to gain unauthorized access to data.
Information security (referred to as InfoSec) is the practice of defending information from unauthorized
access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
Computer security is concerned with information security as applied to computing devices such as

Preparedby Esku IcT Department1


Abadir Secondary School ICT Handout

computers, smart phones and computer networks such as private and public networks, including the
whole Internet.

5.4 Privacy and Security

Privacy is concerned with safeguarding and respecting people’s rights to manage their data in a broader
sense. Privacy, like security, is crucial because it prevents data. Security is concerned with information
leaks caused by malware infections and data breaches whereas privacy is concerned with personal data
rights in terms of how information is acquired, utilized and maintained as well as who has access to it.
5.4.1 Data Privacy
Data privacy or information privacy is concerned with proper handling, processing, storage and usage of
personal information. It is all about the rights of individuals concerning their personal information.
5.4.2 Data Security
Data security is concerned with measures that an individual or organization is taking to prevent any third
party from unauthorized access.

Data security is concerned with policies, methods and means to secure personal data.
5.5 Computer Security Threats
A security threat is a malicious act that aims to corrupt or steal data or disrupt school computer network
or organization systems. Security event refers to an occurrence during which school data or its network
may have been exposed. An event that results in a data or a network breach is called a security threat.
Some of the computer security threats are computer viruses, computer worms, Trojan horses, spyware,
adware and ransomware.Computer virus is a malicious program which replicates itself and infects the
files and programs of your PC and can make them non-functional.Computer worm is self-replicating
computer program that spreads malicious codes using computer networks.

5.6 Threat Prevention Strategies Tooftaalee Ittisa Balaa

Several defensive strategies and tools have been developed to assist in preventing threats. These
include encryption, firewalls, anti-virus software, biometric security, user identification and passwords,
security monitors and disaster recoverybalaa irraa dandamachuu. የአደጋ ማገገም

Hence, threat prevention strategies could be categorized into two: technical and non-technical.

5.6.1 Technical Prevention Strategies

Taking data backup

Creating multiple copies of data to recover in case of any data loss using the external hard drive, CD,
Flash memory or online data backup site, such as the cloud, in case of any data loss.

Installing protective electrical devices


Installing devices such as Uninterruptible Power Supply (UPS) that can provide battery backup in case of
a power outage.humni ibsaa addaan cituu.
Installing antivirus and antispyware programs

Preparedby Esku IcT Department2


Abadir Secondary School ICT Handout

When using the Internet, you might encounter spyware or virus, which causes great damage to your
computer. It is important to install an antivirus and antispyware program that can prevent and remove
the viruses.

Installing firewall
A firewall system prevents unauthorized access to a private network from network traffic. A firewall
system forms a barrier dhorkaa between trusted and untrusted websites from threats like hackers and
worms.
Encrypting data
Preventing lost, stolen or hacked documents and files from being seen.
Installing anti-virus software
Antivirus software is a type of program designed and developed to protect computers from malware like
viruses, computer worms and spyware.
Creating and changing user account
A user account is a collection of settings and permissions specific to a user that determines what a user
can and cannot do on the computer.
Note In Window, the path to locate the backup data option could be : Right click on the Start button
click on Control Panel click on System and Security click Backup and Restore click Backup now
Firewall
A firewall is a network security device that monitors incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security rules.
A firewall program does not protect you from all viruses, so it is necessary to install an antivirus or
antimalware application. Windows defender can help you protect against viruses that the firewall does
not protect from. Practice the following on your school or home computer.
1. Turn the Microsoft defender firewall on or off.
2. It is important to have Microsoft Defender Firewall on, even if you already have another firewall on. It
helps you protect yourself from unauthorized access.
3. Select the Start Windows logo Start button Settings Gear-shaped Settings icon Update & Security
Circular arrows Sync icon Windows Security and then Firewall & network protection. Open Windows
Security settings.
4. Select a network profile.
5. Under Microsoft Defender Firewall, switch the setting to on. If your device is connected to network,
network policy settings might prevent you from completing these steps. For more info, contact the
computer’s administrator.
6. To turn it off, switch the setting tooff.Turning off Windows Defender Firewall could make your device
(and network, if you have one) more vulnerable to unauthorized access. If there is an application you
need to use that is being blocked, you can allow it through the firewall, instead of turning the firewall
off.
Note: If you get errors or if the setting will not turn on, you can use the troubleshooter and then try
again.
Antivirus Software
Antivirus software is a type of program designed and developed to protect computers from malware like

Preparedby Esku IcT Department3


Abadir Secondary School ICT Handout

viruses, computer worms and spyware. Antivirus programs function to scan, detect and remove viruses
from your computer.
Creating and changing user account
A user account is a collection of settings and permissions specific to a user that determines what a user
can and cannot do on the computer. These settings are also used to protect the user’s files and folders
from access by another non-authorized person. In particular, a user account will determine the files and
folders a user can access and the changes a user can make to the computer.
Types of User Account
Three types of user accounts that are available in Windows .

Administrator

Administrators have access to everything on the computer, and can make changes to anything, such as
installing software and changing security settings. When you first install Windows 10, the initial user
account will be an administrator account. The administrator account can also create new users and
manage user accounts.

Standard

Standard users will have limited ability to make changes to the computer, except for personalizing the
computer, such as applying a screen saver or changing a theme. Standard users will not have access to
other users’ personal files and folders.
Most computer users will be allocated a standard account.
Guest

Guest accounts exist for temporary users of a computer and only one guest account can exist on a
computer. Guest accounts are similar to standard accounts, except there is no privacy, as anybody can
log onto a guest account. The guest account provides access to installed programs but does not have
permission to access data in other users’ personal folders.
Guest accounts are often used in internet cafes.
Checking User Account on Windows
Modification of user and administrator accounts can be done in Control Panel.
Icons and language may differ slightly depending on the build version of Windows you are using.
ƒ Step 1 : Click on the Windows icon and type Control Panel and click on the Control Panel application.
ƒ Step 2 : Click User Accounts.

Note that you will need to be on or have access to an administrator account to make any of these
changes. If you do not have access to this account or it is managed by a service provider, please contact
the relevant local administrator or your service provider.
ƒ Step 3 : Select Add or Remove User Accounts options

ƒ Step 4 : Check the existing accounts on your PC. You should only have one administrator account and
your daily use account should not be the administrator account. All next steps start from here

Preparedby Esku IcT Department4


Abadir Secondary School ICT Handout

Create a New Account

To create a new account on your PC, follow the following steps.


ƒ Click on Add a new user in PC setting.

ƒ Scroll down and click on Add someone else to this PC.

ƒ Enter the username, passphrase and security questions and answers.


ƒ Click next; by default, this new user will not have administrator access.
You can also create a new user account using a Microsoft account; however, you must be connected to
the Internet.
Click on the Next button. This will create a new account.
5.6.2 Non-technical Prevention Strategies

It is impossible to prevent natural disasters, but it is possible to reduce the damage they inflict
raawwachuuthrough careful planning. Some measures can be taken to reduce their impact. The
measures that you can take to protect your data and computer from natural threats could be keeping
your computer in a secure location, storing data safely and protecting programs and data.
5.7 Cyber Security

Cyber security is the application of technologies, processes and controls to protect systems, networks,
programs, devices and data from cyber-attacks. Cyber security aims to reduce the risk of cyber-attacks
and protect against the unauthorized exploitation of systems, networks and technologies.
Cyber-attacks can cause electrical shutdowns, failure of military equipment and breaches of national
security secrets. They can result in theft of valuable, sensitive data like medical records. They can disrupt
phone and computer networks or paralyze systems, making data unavailable. Cyber security applies in a
variety of contexts, from business to mobile computing, and can be divided into a few common
categories. Such as network security applications, information security, operational security, disaster
recovery and end-user education. Common ways of cyber-attack prevention can be outlined as the
follows.
1. Use strong passwords

2. Secure your computer


3. Be social-media savvyMiidiyaa hawaasaa kan beeku ta'i
4. Secure your mobile devices
5. Install the latest operating system updates
6. Protect your data
7. Secure your wireless network
8. Protect your e-identity
9. Avoid being scammed
If you need help with maintenance or software installation on your computer, consult your service
provider or certified computer technician.
Lab of Chapter 5

Preparedby Esku IcT Department5


Abadir Secondary School ICT Handout

Steps

1.Taking data backup

Note In Window, the path to locate the backup data option could be : Right click on the Start button
click on Control Panel click on System and Security click Backup and Restore click Backup now

2.Installing protective electrical devices

3.Installing anti-virus software

4.Firewall

5. Create and changing user account

6.Types of User Accountcc1p!p!

7.Checking User Account on Windows

8.Create a New Account

Preparedby Esku IcT Department6

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy