0% found this document useful (0 votes)
60 views5 pages

2 ComputerSecurity&Privacy

This 3-sentence summary provides the key details about the document: The 2-month course covers computer security and privacy, exploring how to protect computer hardware, software, data and information from threats like hackers, viruses, and loss. It discusses strategies like installing antivirus software, using firewalls, encrypting data, backing up files, and avoiding internet scams. The document also defines computer security risks, types of viruses, and privacy threats like spyware and phishing.

Uploaded by

Neo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views5 pages

2 ComputerSecurity&Privacy

This 3-sentence summary provides the key details about the document: The 2-month course covers computer security and privacy, exploring how to protect computer hardware, software, data and information from threats like hackers, viruses, and loss. It discusses strategies like installing antivirus software, using firewalls, encrypting data, backing up files, and avoiding internet scams. The document also defines computer security risks, types of viruses, and privacy threats like spyware and phishing.

Uploaded by

Neo
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Course Name: Digital Literacy

Faculty: Information and Communication Technology

Mode: Notes

Chapter: 2-Computer Security & Privacy

Duration: 2 month

Assessment: Yes

Contact: [email protected]
www.facebook.com/EvowareCreative
+266 53818152 / 27008152

EVOWARE CREATIVE 1
What is Computer Security and Privacy?

Learning Outcomes
In this module, you will explore why you need to protect your computer hardware, software
and electronic data from damage, loss and theft more especially while browsing the internet.
You will also learn about solutions and devices that you can use to protect the data on your
computer.

Computer Security and Privacy


Computer Security and privacy is all about using the best mechanism to protect your
information from being damaged, lost or stolen. Information can be lost or damaged by natural
threats such as fire or extreme temperature.
Threats that are caused by people include hackers. A hacker is someone who gains access to
your computer through internet in order to cause harm or use it in an unauthorized manner.
Hackers can delete or alter your information; they can also send your personal information to
other companies. They can also place virus in your computer.
Computer security risk: is an action which could cause damage or loss to computer hardware,
software, data or information.
Information that is transmitted over networks has a higher degree of risk.
Computer Virus is a program that has been created intentionally to destroy data or make
computer not to function.
The computer virus replicates (copy) itself in a computer and does reduce the speed of one’s
computer. The computer virus can also spread to other computers.
Computer virus is a man-made; this means that it is created by a person. The virus is created by
Programming Language (the language that tells the software or program or computer how it
should behave.) Examples of programming language include;
A) Java b) C++ C) C# D) Python
You can also create your own virus and define how it should behave.
Two types of Virus
a) Worm – copies itself repeatedly in memory or over a network. It use up the computer
until the computer d=shut down
b) Trojan horse – a malicious program that hides within or looks like a legitimate program

EVOWARE CREATIVE 2
Strategies to protect the computer
Below is the list of strategies that you should practice in order to prevent your computer from
these threats that can damage our data.
 Install antivirus program and update it regularly. Antivirus program is a program which
protects a computer against virus. E.g Smadav, Kaspersky etc. When using internet you
can be vulnerable of spyware or viruses that can greatly destroy your computer. So it is
always best to download and install anti-virus and antispyware as they will alert you to
the presence of virus and will prevent viruses from entering.
 Before using any removable drives (flash) scan for viruses or malware.
 Never start a computer with removable device (flash) inserted into drives or plugged in
ports.
 Scan all downloaded programs for viruses and other malware.

EVOWARE CREATIVE 3
 Install a firewall. Firewall is hardware/software that protects a network’s resource from
intrusion. Firewall prevents unauthorized access to the private network that is
connected to the internet. It forms a barrier between trusted and untrusted websites.
 Never open the email message from unknown source. All emails from unknown source
should be deleted without opening.
 Back up of data – This is the process of replicating information either to external hard
drive or online storage in the cloud. Nowadays technology allows us to store our data
directly to the internet and that system is called Cloud Computing. Creating back up
regularly minimizes the impact of these threats, because even if the original data is lost
you have copies that you can recover by computer.
 Encrypt data – this is one of the commonly used security strategy as it improves the
security of a file or message by scrambling its contents. Encrypted files or messages can
only be read by someone who has the encryption key. Microsoft Bit locker is one of the
encryption software; it can be turned on to protect data from being read by
unauthorized users.

EVOWARE CREATIVE 4
Internet Security
Spyware
It is a program which can be installed on your computer without your knowledge. Spyware
programs collect private information such as personal details, browsing, name and address.

Internet Scams and Phishing


Now that you are going to study online to attain your goal, you might encounter attractive
offers in your email messages or through websites or chat room application, all these are
Internet Scams or phishing. Their major goal is to trick you into revealing personal or financial
information. So please never participate in such sites either by providing with your personal
information or anything.
Examples of Internet Scam
Data 1 Data 2 Difference Internet Scam
www.beforward.jp www.befoward.jp ‘r’ is missing in the Yes data 2 is a
data 2 of Beforward scam
domain, and this is a
scam.
www.standardbank.co www.standardbank.c ‘m’ is missing in data Yes data 2 is a
m o 2 scam

EVOWARE CREATIVE 5

You might also like