Unit 4 A
Unit 4 A
Although there is no single, universal definition of ICT, the term is generally accepted to
mean all devices, networking components, applications and systems that combined allow
people and organizations (i.e., businesses, nonprofit agencies, governments and criminal
enterprises) to interact in the digital world.
ICT- “Diverse set of technological tools and resources used to communicate, and to create,
disseminate, store, and manage information.”
Security, in information technology (IT), is the defense of digital information and IT assets
against internal and external, malicious (cruel) and accidental threats.
This defense includes detection, prevention and response to threats through the use of
security policies, software tools and IT services.
Security is critical for enterprises and organizations of all sizes and in all industries. Weak
security can result in compromised systems or data, either by a malicious threat actor or an
unintentional internal threat.
TYPES OF SECURITY
Physical security
Physical security is the protection of personnel, hardware, software, networks and data from
physical actions, intrusions and other events that could damage an organization. This
includes natural disasters, fire, robbery and terrorism, among others.
Information security
Information security, also called infosec, encompasses a broad set of strategies for managing
the process, tools and policies that aim to prevent, detect and respond to threats to both
digital and non-digital information assets.
a. Application security - the protection of applications from threats that seek to manipulate
application and access, steal, modify or delete data. These protections use software,
hardware and policies, and are sometimes called countermeasures. Common
countermeasures include application firewalls, encryption programs, patch management and
biometric authentication systems.
b. Cloud Security- the set of policies and technologies designed to protect data and
infrastructure involved in a cloud computing environment. The top concerns that cloud
security looks to address are identity and access management, and data privacy.
c. Endpoint security - the part of network security that requires network devices nodes to
meet certain security standards before they can connect to a secure network. Nodes devices
include PCs, laptops, smartphones and tablets. Endpoint security also extends to equipment
like point-of-sale (POS) terminals, bar code readers and IoT devices.
d. Internet security - the protection of software applications, web browsers and virtual
private networks (VPNs) that use the internet. Using techniques such as encryption and
internet security aim to defend the transfer of data from attacks like malware and phishing as
well as denial-of-service (DoS) attacks.
e. Mobile security - the protection of portable devices, such as smartphones, tablets and
laptops. Mobile security, also known as wireless security, secures the devices and the
networks they connect to in order to prevent theft, data leakage and malware attacks.
f. Network security - the protection of a network infrastructure and the devices connected
to it through technologies, policies and practices. Network security defends against threats
such as unauthorized access, and malicious use and modifications.
ICT security
1.1 Definition
Computer security, cybersecurityor information technology security (IT security) is the
protection of computer systems from theft or damage to their hardware, software or
electronic data, as well as from disruption or misdirection of the services they
provide.A secure connection is a connection that is encrypted by one or more security
protocols to ensure the security of data flowing between two or more nodes.
AGE: As computers age they tend to fail more often. Electronic components are stressed
over time as they heat up and cool down. Mechanical components simply wear out. Some of
these failures will be dramatic. Regrettably, it’s not a question of “if”, but “when” in regard
to equipment failure.
Solution: Keep an eye on the specials after three to five years.
INCOMPATIBILITIES: You can have hardware problems on a perfectly healthy PC if
you have devices installed that do not properly share interrupts. Sometimes problems are
immediately obvious, other times they are subtle and depend upon certain events to happen
at just the wrong time, then suddenly strange things happen!
Solution: Make a really good backup before installing anything (hardware or software) so
you can revise the system back to a stable state should something crop up.
FINGER FAULTS: (Typing error)
These are an all too frequent cause of data corruption. This commonly happens when you
are intending to delete or replace one file but actually get another.
Another finger fault problem arises with touchpads below the space bar on notebook
computers. It’s very easy to brush the touchpad when you are typing away and suddenly find
yourself entering characters in a screen location very different from where you were before
you touched the pad.
Solution: Be careful and look up now and again to make certain your cursor is where you
want it.
MALICIOUS OR CARELESS DAMAGE: Someone may accidentally or deliberately
delete or change a file on your PC when you’re not around. If you don’t keep your PC
locked in a safe, then this is a risk. Most of this type of damage is done unintentionally by
someone you probably know. This person didn’t mean to cause trouble; they simply didn’t
know what they were doing when they used your PC.
Solution: Never run the computer as an administrative user and have guest accounts
available for others who use the computer. Keep up-to-date backups as well.
TYPHOID MARY: One possible source for computer infections is the Customer Engineer
(CE), or repairman, they will almost always run a diagnostic program from diskette. It’s
very easy for these diskettes to become infected and spread the infection to your computer.
Always check your system after other people have placed their floppy disk into it. (Better
yet, if you can, check their disk with up-to-date anti-virus software before anything is run.)
Solution: Insist on testing their disk before use or make certain they’ve used an up-to-date
anti-virus before coming to your location.
MAGNETIC ZAPS: Computer data is generally stored as a series of magnetic changes on
disks. While hard disks are generally safe from most magnetic threats because they are
encased within the computer compartment, floppy disks are highly vulnerable to magnets.
Some of the more subtle sources of magnetism include:
Computer Monitor. Don’t put floppy disks anywhere near the monitor; it generates a
magnetic field. (Generally applies to the older CRT displays.)
Telephone. When ringing, telephones (particularly older phones with a bell) generate a
magnetic field.
Bottom Desk Drawer. While the desk drawer does not generate a magnetic field, the vacuum
cleaner that the maintenance people slide under the desk to clean the floor does.
Bottom Bookcase Shelf and File Cabinet Drawer. Same comment as the desk drawer just
above.
Pets. Pet fur generates a strong electrostatic charge which, if discharged through a disk, can
affect files on the disk.
Solution: Stay away from magnets or sources of static of all kinds when working with a
computer.
Computer virus: A computer virus is a small piece of software that can spread from one
infected computer to another. The virus could corrupt, steal, or delete data on your computer
—even erasing everything on your hard drive. A virus could also use other programs like
your email program to spread itself to other computers.
Rogue security software: It is a pop-up window that advertises a security update or alert. It
appears legitimate and asks you to click on a link to install the “update” or “remove”
unwanted malicious software that it has apparently detected. This could be rogue security
software designed to lure people into clicking and downloading malicious software.
Microsoft has a usefulwebpage that describes rogue security software and how you can
protect yourself.
Trojan horse: Users can infect their computers with Trojan horse software simply by
downloading an application they thought was legitimate but was in fact malicious. Once
inside your computer, a Trojan horse can do anything from record your passwords by
logging keystrokes to hijacking your webcamto watch and record your every move.
Malicious spyware: Malicious spyware is used to describe the Trojan application that was
created by cybercriminals to spy on their victims. An example would be key logger software
that records a victim’s every keystroke on his or her keyboard. The recorded information is
periodically sent back to the originating cybercriminal over the Internet. Key logging
software is widely available and is marketed to parents or businesses that want to monitor
their kids’ or employees’ Internet usage.
Computer worm: A computer worm is a software program that can copy itself from one
computer to another, without human interaction. Worms can replicate in great volume and
with great speed. For example, a worm can send copies of itself to every contact in your
email address book and then send itself to all the contacts in your contacts’ address
books.Because of their speed of infection, worms often gain notoriety overnight infecting
computers across the globe as quickly as victims around the world switch them on and open
their email.
Botnet: A botnet is a group of computers connected to the Internet that have been
compromised by a hacker using a computer virus or Trojan horse. An individual computer in
the group is known as a “zombie “computer.The botnet is under the command of a “bot
herder” or a “bot master,” usually to perform nefarious activities. This could include
distributing spam to the email contact addresses on each zombie computer, for example. If
the botnet is sufficiently big in number, it could be used to access a targeted website
simultaneously in what’s known as a denial-of-service (DoS) attack. The goal of a DoS
attack is to bring down a web server by overloading it with access requests. Popular
websites such as Google and Twitter have been victims of DoS attacks.
Spam: Spam in the security context is primarily used to describe email spam—unwanted
messages in your email inbox. Spam, or electronic junk mail, is a nuisance as it can clutter
your mailbox as well as potentially take up space on your mail server. Unwanted junk mail
advertising items you don’t care for is harmless, relatively speaking. However, spam
messages can contain links that when clicked on could go to a website that installs malicious
software onto your computer.
Rootkit: According to TechTarget, a rootkit is a collection of tools that are used to obtain
administrator-level access to a computer or a network of computers. A rootkit could be
installed on your computer by a cybercriminal exploiting a vulnerability or security hole in a
legitimate application on your PC and may contain spyware that monitors and records
keystrokes.
____________