Trends in Computing
Trends in Computing
This topic brings awareness on how to understand and appreciate contemporary (modern) issues of
computer development
Sub Topics;
Computer ethics,
Emerging technologies,
Computer professions.
computer integrity
Software integrity Software integrity can be translated as protecting software against various threats
upon its components to ensure that the software has not been altered or compromised.
Hardware integrity
Hardware integrity is an acceptable level that the physical environment is adequately secured. This
involves controlling access to hardware resources
Computer intrusion
Computer protection
Computer protection is a mechanism built into computer architecture to support the enforcement of
security policies. A simple definition of a security policy is to set who may use what information in a
computer system.
Computer security
A Computer Security refers to the protection of hardware, software, machines and networks from
unauthorized access. Security measures include restricted access to machines and networks for certain
employees or to prevent access by hackers. The degree of security of information systems largely
determines society’s confidence in the information contained in the systems
Computer Hardware Security Computer hardware security protects the machine and peripheral
hardware from theft and electronic intrusions and damage.
Computer Software Security Computer software security refers to the use of software to prevent
damage of computer programs such as operating systems, application programs and files.
computer crime
Computer crime is any illegal act involving a computer for personal gain. Computer systems can be used
to steal money, goods, software or corporate info
Hackers, crackers
Script kiddies (is an unskilled individual who uses scripts or programs developed by others to attack
computer systems and networks and deface websites)
Employees (including IT personnel & end users and part time personnel)
Third parties (refers to components that are developed by companies besides the original computer
manufacturer.)
Former employees
Revenge
Political conviction
Greed
Hacking
Software piracy
Trespass
Harassing other users using computer e.g. through social network like Facebook.
CYBERCRIME
Cyber terrorism Cyber terrorism is the use of computer technology as a tool and a vehicle to intimidate
and pressurize others.
Examples of Cyber terrorism are: • Denial of Service attack (DOS) • Identity theft • Online blackmail
COMPUTER VIRUSES A Computer virus is a destructive computer program designed by malicious people
with the intention of attacking and destroying computer files, programs and or the entire computer
system. It can also be defined as a small program that copies itself into other programs and spreads
through multiple computers
Features of computer viruses
Types of Viruses
Viruses are often designed to affect, or infect, a computer negatively by altering the way it normally
works without the knowledge or permission of the owner.
A boot sector virus executes when a computer starts up because it resides in the boot sector of a floppy
disk or the master boot record of a hard disk.
A file virus attaches itself to program files, and is loaded into memory when the infected program is run.
A macro virus uses the macro language of an application (e.g., word processor or spreadsheet) to hide
the virus code.
A worm copies itself repeatedly in memory or on a disk drive until no memory or disk space remains,
which makes the computer stops working.
A Trojan horse is a program that hides within or looks like a legitimate program, but executes when a
certain condition or action is triggered.
Hoax Virus
Comes as e-mail with an attractive subject and launches its self when e-mail is opened.
A polymorphic virus modifies its program code each time it attaches itself to another program or file, so
that even an antivirus utility has difficulty in detecting it
Root-kit A Root kit is a stealthy type of software which is usually malicious, designed to hide the
existence of certain processes or programs from normal methods of detection and enable continued
privileged access to a computer.
E-mail viruses
This virus type spreads as an attachment to e-mail messages and then reproduces itself automatically
mailing itself to a number of recipients in the victim’s email address book.
Back doors
this may be a Trojan or worm that allows hidden access to a computer system
There is an unusual error messages frequently being displayed on the screen for