0% found this document useful (0 votes)
20 views5 pages

Trends in Computing

This document discusses trends in computing, including computer integrity and security, computer ethics, computer and society, emerging technologies, system analysis, and computer professions. It then summarizes key topics such as computer integrity, intrusions, protection, security, hardware security, software security, computer crime, cybercrime, computer viruses, and symptoms of an infected computer. Computer security involves protecting hardware, software, networks, and data from unauthorized access or intrusions. Computer crimes are illegal acts involving computers, such as hacking, software piracy, or cyber terrorism. Computer viruses are malicious programs that copy themselves and spread, potentially deleting files or disrupting systems.

Uploaded by

jobmulyenkejje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views5 pages

Trends in Computing

This document discusses trends in computing, including computer integrity and security, computer ethics, computer and society, emerging technologies, system analysis, and computer professions. It then summarizes key topics such as computer integrity, intrusions, protection, security, hardware security, software security, computer crime, cybercrime, computer viruses, and symptoms of an infected computer. Computer security involves protecting hardware, software, networks, and data from unauthorized access or intrusions. Computer crimes are illegal acts involving computers, such as hacking, software piracy, or cyber terrorism. Computer viruses are malicious programs that copy themselves and spread, potentially deleting files or disrupting systems.

Uploaded by

jobmulyenkejje
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Trends in computing

This topic brings awareness on how to understand and appreciate contemporary (modern) issues of
computer development

Sub Topics;

Computer Integrity and Security,

Computer ethics,

Computer and society,

Emerging technologies,

System Analysis and

Computer professions.

computer integrity

Software integrity Software integrity can be translated as protecting software against various threats
upon its components to ensure that the software has not been altered or compromised.

Hardware integrity

Hardware integrity is an acceptable level that the physical environment is adequately secured. This
involves controlling access to hardware resources

Computer intrusion

Computer intrusion is an incident of unauthorized access to data or an automated information system.


In common usage, a hacker is a person who breaks into computers and computer networks, either for
profit gain or motivated by the challenge

Computer protection

Computer protection is a mechanism built into computer architecture to support the enforcement of
security policies. A simple definition of a security policy is to set who may use what information in a
computer system.

Computer security

A Computer Security refers to the protection of hardware, software, machines and networks from
unauthorized access. Security measures include restricted access to machines and networks for certain
employees or to prevent access by hackers. The degree of security of information systems largely
determines society’s confidence in the information contained in the systems

Computer Hardware Security Computer hardware security protects the machine and peripheral
hardware from theft and electronic intrusions and damage.

Computer Software Security Computer software security refers to the use of software to prevent
damage of computer programs such as operating systems, application programs and files.

Measures used to ensure Computer software security

Installing intrusion detection system

Authenticate computer user

Use antivirus software

Configure encryption system for data

Install firewall to filter out unwanted information.

computer crime

Computer crime is any illegal act involving a computer for personal gain. Computer systems can be used
to steal money, goods, software or corporate info

Perpetrators of computer crimes are:

Hackers, crackers

Computer crime syndicates

Script kiddies (is an unskilled individual who uses scripts or programs developed by others to attack
computer systems and networks and deface websites)

Employees (including IT personnel & end users and part time personnel)

Third parties (refers to components that are developed by companies besides the original computer
manufacturer.)

Former employees

Interested outsiders (competitors, terrorists, etc.)

Motives may include:

Revenge

Political conviction
Greed

Fun (enjoy the challenge or seeing the target “go down”)

Sense of righteousness Terrorism

Examples of computer crime are:

Computer virus attack

Hacking

Software piracy

Spamming other users

Cracking software without permission

Trespass

Replacing computer parts without permission

Carrying out fraud activities

Using a computer to bear false witness

Carrying out cyber terrorism

Harassing other users using computer e.g. through social network like Facebook.

Working as online predator

Using computer to carry out drug trafficking

Obscene or offensive content.

CYBERCRIME

This refers to online or Internet-based illegal acts.

Cyber terrorism Cyber terrorism is the use of computer technology as a tool and a vehicle to intimidate
and pressurize others.

Examples of Cyber terrorism are: • Denial of Service attack (DOS) • Identity theft • Online blackmail

COMPUTER VIRUSES A Computer virus is a destructive computer program designed by malicious people
with the intention of attacking and destroying computer files, programs and or the entire computer
system. It can also be defined as a small program that copies itself into other programs and spreads
through multiple computers
Features of computer viruses

They attach themselves to files or programs.

The virus installs themselves in a computer system without permission.

They replicate (multiply) themselves occupying large space in memory

Some amend files or operations of a program without permission

Some delete files or programs in a computer

Types of Viruses

Viruses are often designed to affect, or infect, a computer negatively by altering the way it normally
works without the knowledge or permission of the owner.

A boot sector virus executes when a computer starts up because it resides in the boot sector of a floppy
disk or the master boot record of a hard disk.

A file virus attaches itself to program files, and is loaded into memory when the infected program is run.
A macro virus uses the macro language of an application (e.g., word processor or spreadsheet) to hide
the virus code.

A logic bomb is a virus that activates when it detects a certain condition.

A time bomb is a kind of logic bomb that activates on a particular date.

A worm copies itself repeatedly in memory or on a disk drive until no memory or disk space remains,
which makes the computer stops working.

A Trojan horse is a program that hides within or looks like a legitimate program, but executes when a
certain condition or action is triggered.

Hoax Virus

Comes as e-mail with an attractive subject and launches its self when e-mail is opened.

A polymorphic virus modifies its program code each time it attaches itself to another program or file, so
that even an antivirus utility has difficulty in detecting it

Root-kit A Root kit is a stealthy type of software which is usually malicious, designed to hide the
existence of certain processes or programs from normal methods of detection and enable continued
privileged access to a computer.

E-mail viruses
This virus type spreads as an attachment to e-mail messages and then reproduces itself automatically
mailing itself to a number of recipients in the victim’s email address book.

Back doors

this may be a Trojan or worm that allows hidden access to a computer system

Symptoms of computer infected by viruses

Unfamiliar graphics appearing on the computer files.

There is an unusual error messages frequently being displayed on the screen for

You might also like