UNIT 5 Ict Grade 10 Shortnote
UNIT 5 Ict Grade 10 Shortnote
U NIT 5
INFORMATION AND COMPUTER SECURITY
Security also means protection and measures taken to guard against sabotage, crime, attack or escape.
Computer security is the protection of computer systems and information from harm, theft and
unauthorized use.
Computer security is also the process of preventing and detecting unauthorized use of your computer
system.
Computer viruses can corrupt and damage computers. Viruses can also open security breaches on a
computer that allows yet another threat, hackers, into the computer system.
Information Security
Information security is simply referred to as InfoSec, which is the practice of defending information
from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or
destruction.
Computer Security
Computer security, also known as cyber security, is about information security as applied to computing
devices such as computers and smartphones as well as computer networks such as private and public
networks including the whole Internet. It is a method for ensuring data that has been stored in
computer systems could not be read or compromised by any individuals without authorization.
Traditionally, information technology (IT) facilities have been protected for three reasons:
To prevent theft of or damage to the hardware.
To prevent theft of or damage to the information.
To prevent disruption of service.
5.3 Impact of Information and Computer Security on Society
Information and computer security risks arise from the intentional or unintentional misuse of computers
and network resources as well as the Internet. These risks may result in the loss of or damage to
computer hardware, software, confidential information and data integrity as well as network and
Internet availability.
Hackers can do several things from stealing your passwords to controlling your computer through
remote access. A Hacker is a person who uses computers to gain unauthorized access to data.
Information security (referred to as InfoSec) is the practice of defending information from unauthorized
access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
Computer security is concerned with information security as applied to computing devices such as
computers, smart phones and computer networks such as private and public networks, including the
whole Internet.
Privacy is concerned with safeguarding and respecting people’s rights to manage their data in a broader
sense. Privacy, like security, is crucial because it prevents data. Security is concerned with information
leaks caused by malware infections and data breaches whereas privacy is concerned with personal data
rights in terms of how information is acquired, utilized and maintained as well as who has access to it.
5.4.1 Data Privacy
Data privacy or information privacy is concerned with proper handling, processing, storage and usage of
personal information. It is all about the rights of individuals concerning their personal information.
5.4.2 Data Security
Data security is concerned with measures that an individual or organization is taking to prevent any third
party from unauthorized access.
Data security is concerned with policies, methods and means to secure personal data.
5.5 Computer Security Threats
A security threat is a malicious act that aims to corrupt or steal data or disrupt school computer network
or organization systems. Security event refers to an occurrence during which school data or its network
may have been exposed. An event that results in a data or a network breach is called a security threat.
Some of the computer security threats are computer viruses, computer worms, Trojan horses, spyware,
adware and ransomware.Computer virus is a malicious program which replicates itself and infects the
files and programs of your PC and can make them non-functional.Computer worm is self-replicating
computer program that spreads malicious codes using computer networks.
Several defensive strategies and tools have been developed to assist in preventing threats. These
include encryption, firewalls, anti-virus software, biometric security, user identification and passwords,
security monitors and disaster recoverybalaa irraa dandamachuu. የአደጋ ማገገም
Hence, threat prevention strategies could be categorized into two: technical and non-technical.
Creating multiple copies of data to recover in case of any data loss using the external hard drive, CD,
Flash memory or online data backup site, such as the cloud, in case of any data loss.
When using the Internet, you might encounter spyware or virus, which causes great damage to your
computer. It is important to install an antivirus and antispyware program that can prevent and remove
the viruses.
Installing firewall
A firewall system prevents unauthorized access to a private network from network traffic. A firewall
system forms a barrier dhorkaa between trusted and untrusted websites from threats like hackers and
worms.
Encrypting data
Preventing lost, stolen or hacked documents and files from being seen.
Installing anti-virus software
Antivirus software is a type of program designed and developed to protect computers from malware like
viruses, computer worms and spyware.
Creating and changing user account
A user account is a collection of settings and permissions specific to a user that determines what a user
can and cannot do on the computer.
Note In Window, the path to locate the backup data option could be : Right click on the Start button
click on Control Panel click on System and Security click Backup and Restore click Backup now
Firewall
A firewall is a network security device that monitors incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security rules.
A firewall program does not protect you from all viruses, so it is necessary to install an antivirus or
antimalware application. Windows defender can help you protect against viruses that the firewall does
not protect from. Practice the following on your school or home computer.
1. Turn the Microsoft defender firewall on or off.
2. It is important to have Microsoft Defender Firewall on, even if you already have another firewall on. It
helps you protect yourself from unauthorized access.
3. Select the Start Windows logo Start button Settings Gear-shaped Settings icon Update & Security
Circular arrows Sync icon Windows Security and then Firewall & network protection. Open Windows
Security settings.
4. Select a network profile.
5. Under Microsoft Defender Firewall, switch the setting to on. If your device is connected to network,
network policy settings might prevent you from completing these steps. For more info, contact the
computer’s administrator.
6. To turn it off, switch the setting tooff.Turning off Windows Defender Firewall could make your device
(and network, if you have one) more vulnerable to unauthorized access. If there is an application you
need to use that is being blocked, you can allow it through the firewall, instead of turning the firewall
off.
Note: If you get errors or if the setting will not turn on, you can use the troubleshooter and then try
again.
Antivirus Software
Antivirus software is a type of program designed and developed to protect computers from malware like
viruses, computer worms and spyware. Antivirus programs function to scan, detect and remove viruses
from your computer.
Creating and changing user account
A user account is a collection of settings and permissions specific to a user that determines what a user
can and cannot do on the computer. These settings are also used to protect the user’s files and folders
from access by another non-authorized person. In particular, a user account will determine the files and
folders a user can access and the changes a user can make to the computer.
Types of User Account
Three types of user accounts that are available in Windows .
Administrator
Administrators have access to everything on the computer, and can make changes to anything, such as
installing software and changing security settings. When you first install Windows 10, the initial user
account will be an administrator account. The administrator account can also create new users and
manage user accounts.
Standard
Standard users will have limited ability to make changes to the computer, except for personalizing the
computer, such as applying a screen saver or changing a theme. Standard users will not have access to
other users’ personal files and folders.
Most computer users will be allocated a standard account.
Guest
Guest accounts exist for temporary users of a computer and only one guest account can exist on a
computer. Guest accounts are similar to standard accounts, except there is no privacy, as anybody can
log onto a guest account. The guest account provides access to installed programs but does not have
permission to access data in other users’ personal folders.
Guest accounts are often used in internet cafes.
Checking User Account on Windows
Modification of user and administrator accounts can be done in Control Panel.
Icons and language may differ slightly depending on the build version of Windows you are using.
Step 1 : Click on the Windows icon and type Control Panel and click on the Control Panel application.
Step 2 : Click User Accounts.
Note that you will need to be on or have access to an administrator account to make any of these
changes. If you do not have access to this account or it is managed by a service provider, please contact
the relevant local administrator or your service provider.
Step 3 : Select Add or Remove User Accounts options
Step 4 : Check the existing accounts on your PC. You should only have one administrator account and
your daily use account should not be the administrator account. All next steps start from here
It is impossible to prevent natural disasters, but it is possible to reduce the damage they inflict
raawwachuuthrough careful planning. Some measures can be taken to reduce their impact. The
measures that you can take to protect your data and computer from natural threats could be keeping
your computer in a secure location, storing data safely and protecting programs and data.
5.7 Cyber Security
Cyber security is the application of technologies, processes and controls to protect systems, networks,
programs, devices and data from cyber-attacks. Cyber security aims to reduce the risk of cyber-attacks
and protect against the unauthorized exploitation of systems, networks and technologies.
Cyber-attacks can cause electrical shutdowns, failure of military equipment and breaches of national
security secrets. They can result in theft of valuable, sensitive data like medical records. They can disrupt
phone and computer networks or paralyze systems, making data unavailable. Cyber security applies in a
variety of contexts, from business to mobile computing, and can be divided into a few common
categories. Such as network security applications, information security, operational security, disaster
recovery and end-user education. Common ways of cyber-attack prevention can be outlined as the
follows.
1. Use strong passwords
Steps
Note In Window, the path to locate the backup data option could be : Right click on the Start button
click on Control Panel click on System and Security click Backup and Restore click Backup now
4.Firewall