Intro To Comp Week-4
Intro To Comp Week-4
INTRODUCTION:
Modern technology has enabled people to work, earn, and safeguard their
hard-earned money and possessions. Unfortunately, the same advanced technology
makes online crime possible, hence the need for learners to become familiar with the
fundamentals of computer security and maintenance to safeguard online information
from cyber theft. This course is designed to arm learners with the necessary skills and
tools to secure their computer data from online theft. By the end of the course,
learners are expected to be familiar with standard computer security programs and
the skills to conduct routine maintenance to keep their computer systems updated
and performing in tip-top shape.
LEARNING OBJECTIVES:
● Understand more about Computer Security
● Perform basic Computer System Configuration and Maintenance
● Appreciate the importance of Computer Security in our daily lives.
PRE-ASSESSMENT:
Multiple Choice: Choose the letter of the best answer. Write your answer on the
sheet provided. (2 pts. each)
1. It examines each packet that crosses the firewall and tests it according to a set of
rules that you set up.
A. Antivirus C. Packet Tracing
B. Disk cleanup D. Packet-filtering firewall
2. A program that can discover programs/files/software/etc. That might compromise
your computer, either by being executable or misusing powerlessness within the
program ordinarily assumed to prepare them.
A. Malware C. Antivirus
B. Windows Firewall D. cleanmngr.exe
3. It means securing a standalone machine by keeping it updated and patched and
also known as cybersecurity
A. Computer Security C. Anti Security
B. Virtual Guard D. Computer Guard
4. It is a computer concerned that only authorized users should be able to modify the
data when needed
A. Authentication C. Virtual
B. Integrity D. Availability
5. A run command alternate route to open the Add/Remove Programs or Uninstall a
Program list on Microsoft Windows XP, Vista, 7, 8, 10 and 11.
A. ipconfig C. cmd
B. msinfo32 D. appwiz.cpl
LESSON PRESENTATION:
Computer Security
Computer security, moreover known as
cybersecurity or IT security, ensures data
frameworks from robbery or harm to the
equipment, the program, the data on them,
and the disturbance or confusion of the
administrations they give. It incorporates
controlling physical get to the equipment and securing against hurt, which will come
through arrange to get to, information, and code infusion. Due to administrators'
negligence, whether deliberateness, coincidental, or due to them being deceived into
going astray from secure methods.
WHAT ARE THE CONCERNS OF COMPUTER SECURITY?
Computer Security is concerned with four primary areas:
1. Confidentiality: As it was authorized, clients can get to information assets and
information.
2. Integrity: As it was authorized, clients ought to be able to adjust the information
when needed.
3. Availability: Information ought to be accessible to clients when required.
4. Authentication: are you communicating with whom you think you're talking with.
One way to discover the resemblances and contrasts among Computer Security is by
asking what is being secured. For outline,
● Information security is securing data from unauthorized get to, alteration &
cancellation.
● Application Security is securing an application by building security highlights
to avoid Cyber Dangers such as SQL infusion, DoS assaults, information
breaches, etc.
● Computer Security implies securing a standalone machine by keeping it
overhauled and fixed.
● Network Security is by securing both the program and equipment innovations.
● Cybersecurity is characterized as ensuring computer frameworks, which
communicate over the computer systems.
1. The Packet-filtering firewall analyzes each parcel that crosses the firewall
and tests the bundle agreeing to a set of rules merely set up. If the package
passes the test, it's permitted to pass. On the off chance that the bundle
doesn't pass, it's rejected. Bundle channels are the slightest costly sort of
firewall. As a result, packet-filtering firewalls are exceptionally common.
2. Stateful packet inspection (SPI) could be a step up in insights from basic
bundle sifting. A firewall with stateful packet inspection looks at bundles in
bunches instead of independently. It keeps track of which bundles have passed
through the firewall and can identify unauthorized get to designs.
It can perform different defensive measures (based on the security settings within
the Anti-virus software) such as quarantine, permanent expulsion, settle, etc. It'll too
search for possibly hurtful records that are download.
At last, whereas the Web has changed and incredibly made strides our lives, this
great organization and its related innovations have opened the entryway to an
expanding number of security dangers that people, families, and businesses must
ensure themselves.
The results of assaults can extend from the gently badly arranged to the weakening.
Vital information can be misplaced, security can be damaged, and your computer
can indeed utilize an exterior assailant to assault other computers on the Web.
PERFORM BASIC COMPUTER SYSTEM CONFIGURATION
To open CMD, press Windows key + R/press R, type CMD, and then press ok.
The Disk Cleanup will appear on your window, and you can now choose what drive
to clean up, then press ok.
A message
window will
appear
confirming if
you want to continue deleting your files
or cancel the Dick
Cleanup.
The ipconfig command underpins the command-line switch /all. This comes about in
more point by point data than ipconfig alone.
The System tab shows the current DirectX form, the computer's hostname, the
working system's form, BIOS, and other information. The DirectX Records tab
shows data approximately the forms of particular DirectX framework records
convenient executables or dynamic-link libraries (DLLs).
DxDiag displays information about the current display settings and the video
hardware on the Display tab. If the computer has more than one monitor, DxDiag
will display a separate tab for each monitor. This tab can disable
DirectDraw, Direct3D, and AGP Texture Acceleration for troubleshooting purposes.
If the installed display driver has passed Windows Hardware Quality Labs testing,
DxDiag will display this result on the right side of the window.
To access Resource and Performance Monitor, open Run, and type PERFMON.
Go to Data Collector Sets > System. Right-click System Performance then click
Start.
This action will trigger a 60-second test. After the test, go to Reports > System >
System Performance to view the results.
In the report above, Performance Monitor noticed a high CPU load from the top
process running, which in this case is sqlservr.exe.
The diagnostic tool can offer more detailed explanations. You need to dive deeper
into the subsections if you need to know more.
COMPUTER MAINTENANCE
Tip: If you don't know how, don't push it, better to know, and learn it first.
SYNTHESIS:
Personal information like the many personal properties we own should be regularly
monitored and secured since our loved ones, and we have worked hard for them.
Lawless elements value personal information theft since our most liquid assets
(e.g., cash, credit, online identity, etc.) could be stolen using the personal
information they obtained. It is, therefore, important to be familiar with the various
computer security platforms and how to effectively configure them for the kind of
technology we use for various electronic and online transactions.
EVALUATION: LESSON 4
Multiple Choice: Choose the letter of the best answer. Write your answer on the
sheet provided. (2 pts. each)
Answer the following question. Write your answer on the sheet provided. (40
points)
1. Types of operating systems? (5 points)
2. System requirement of Operating system? (10 points)
3. What is the purpose of system requirements? (10 points)
4. What is the OS available? In the market today? (5 points)
5. In two to three sentences, write the importance of Computer Security in
your life? (5points)
6. Differentiate the types of a computer system using a Venn Diagram.
(5points)
REFERENCES:
Rouse, G., et al, (2021), OCR GCSE Computer Science,
Hoddereducation.co.uk
Perdew, L, (2017), Information Literacy in The Digital Age. Abdopublishing, inc.
Doyle, S. (2017), Complete ICT for Cambridge IGCSE, (2nd Edition)
Brown, G., (2019), Cambridge IGCSE ICT, (2nd Edition)
Alford, D., (2021), BGE S1-S3 Computing Science and Digital Literacy for third
and fourth levels
Reeves, B, (2019), AQA A Level Computer Science
Medicine, J., (2019), Networking for Beginners the Complete Guide to
Computer Network Basics, Wireless Technology and Network Security.