ICT by Lucas
ICT by Lucas
INTRODUCTION TO INFORMATION
TECHNOLOGY
COMPUTER LITERACY
Nuwamara
6/13/2022
INTRODUCTION
Today, almost all of us in the world make use of computers in one way or the other. It finds
applications in various fields of engineering, medicine, commercial, research and others. Not only
in these sophisticated areas, but also in our daily lives, computers have become indispensable.
They are present everywhere, in all the dev ices that we use daily like cars, games, washing
machines, microwaves etc. and in day to day computations like banking, reservations, electronic
mails, internet and many more.
The word computer is derived from the word compute. Compute means to calculate. The
computer was originally defined as a super-fast calculator. It had the capacity to solve complex
arithmetic and scientific problems at very high speed. But nowadays in addition to handling
complex arithmetic computations, computers perform many other tasks like accepting, sorting,
selecting, moving, comparing various types of information. They also perform arithmetic and
logical operations on alphabetic, numeric and other types of information. This information
provided by the user to the computer is data. The information in one form which is presented to
the computer is the input information or input data
Information in another form is presented by the computer after performing a process on it. This
information is the output information or output data. The set of instructions given to the computer
to perform various operations is called as the computer program. The process of converting the
input data into the required output form with the help of the computer program is called as data
processing. The computers are therefore also referred to as data processors Therefore a
computer can now be defined as a fast and accurate data processing system that accepts data,
performs various operations on the data, has the capability to store the data and produce the results
on the basis of detailed step by step instructions given to it.
Evolution of Computers
From Earliest times people used tools and techniques to help them count more reliably,
measure more accurately, record more indelibly, transmit more clearly, and they used
Abacuses
Measuring tapes
Slide rules
Weighing scales
Clocks
A Computer is simply the latest in this line of calculating and recording machines The
First Electronic Computers were produced in the 1940‟s.
These computers used vacuum tubes, which were so big; they were eventually replaced
with transistors and then later replaced by integrated circuits on silicon board.
They can store more information, they consume less power and they have become much
faster
Since the Second World War, a series of radical breakthroughs in electronics have
occurred.
With each major breakthrough, the computers based upon the old forms of electronics have
been replaced
Computer Generation
A computer generation refers to the period when computers changed from simple technology to
advanced technology.
There are a number of generations where computers have changed these include
Each generation is defined by a significant technological development that changes fundamentally
how computers operate – leading to more compact, less expensive, but more powerful, efficient
and robust machines.
Second Generation Computers (1959 and 1964) Transistors and Batch Filing
Characteristics
They were smaller than first Generation computers.
They used less quantities of Electricity than in the first Generation computers.
They used transistors as their primary electronic component.
They used magnetic tapes to input and output data
They were slightly cheaper and faster than the first generation computers
They were programmed in High level Languages such as FORTRAN (FORmaula
TRAnslation) COBOL (Common Business Oriented Language)
They generated heat though a little less than those of first generation.
Examples of Second Generation computers include: o Supper computers such as IBM 730 and
LARC (Liver More Atomic Research Computer) IBM-7000, CDC 3000 series, MARK III,
Honeywell 400
Third Generation Computers (1964 and 1972) Integrated Circuits and Multi-
Programming
Characteristics
They were smaller than their predecessors in terms of size. There was introduction of
Operating System such as MULTICS Output was visualized on the monitors.
They used motherboards, data was input using a keyboard.
There was introduction of Integrated Circuit (ICs), a device that brings together many
electronic components onto a single package. Electronic components are normally
transistors.
They stored information on Magnetic devices called Metal Oxide Semi-conductors (MOS)
They were programmed in simple languages such as BASIC (Beginners all Purpose
Symbolic Instruction Code)
Examples of 3rd generation include: Micro- computers which used Micro-processors. IBM-360,
Personal Data Processor (PDP), IBM-370
The fifth generation computers will use super large scale integrated chips.
They will be able to recognize image and graphics fifth generation computer aims to be
able to solve highly complex problem including decision making, logical reasoning. They
will be able to use more than one CPU for faster processing speed
Smart cars e.g. Tesla's autopilot cars and Google's self-driving cars.
Computer Aided Diagnosis for detection of cancer.
Definition of a Computer
o OR
A Computer is a general purpose electric machine which can receive, store, manipulate and
output information.
A computer is an electronic device capable of accepting in put of data, processing it,
outputting information and storing it for later use.
Taking into consideration the definition above, all computers regardless of their differences in size,
capacity, speed, cost and number of users, have to perform four basic functions. These are:
processing of data
Storing information.
To get general knowledge and skills in the use of computer and related technologies
To use the knowledge acquired (got) from the computer studies to improve learning in
other or related subjects.
To be able to work with and in our present day science based society
To show the best computer skills required for employment
For communication purposes
For entertainment and leisure
Security and military purposes; Computers are used to track down criminals by use of
surveillance cameras (CCTV), computerized alarm systems, biometric identity like finger
print, security lights that only go on after detecting movement of persons. Security of data
and information, advent of smart weapons like cruise missiles, unmanned aerial
vehicles(UAVs/ drones), smart bombs.
Education sector (Academics); E-learning, computer aided learning(CAL), computer
based training(CBT), people can use computers for study purposes like studying online,
and presenting their research findings to their lecturers who are upcountry.
Governance; used to record national statistics e.g demographic data, management of
democratic electoral exercises by use of biometric voter identification, social service
records and statistics regarding education, health, social security, security systems.
Manufacturing; control systems in a factory, use of robots in factory operations like
welding, assemblage, lifting which could be challenging to humans, Computer Aided
Design(CAD)
X-tics of computers
Speed
Accuracy
Storage
Diligence (does not complain)
Artificial Intelligence (Programmable)
Automation
Information
This is a collection of organized data that has been processed and is meaningful
The data processing cycle starts with the human ware that generates the input facts.
Inputting
The computer user enters raw facts into the computer using any of the input devices e.g. by the
use of a keyboard, mouse, touch pad, microphone etc.
Data to be input has to be collected from their sources and recording it onto some media e.g.
using paper, questioners, voice or video recording.
Processing
The central processing unit (CPU) is responsible for processing the data. These facts will then go
to the logical control unit processing and it will forward it to the Arithmetic Unit to calculate the
number of bits and bytes in order to determine the size of the data being worked on.
Outputting
Information is then presented on the Visual Display Unit (monitor).
It can also be printed or output through other output devices such as speakers.
Storing
The formation in is then sent to the RAM for temporary storage (Primary Storage) or saved on
other storage devices such as hard drives or CD ROMs
Classification of computers
Computers represent and process data the same way but there are different classifications of
computers. These include; 1. Classification by process
2. Classification by size
3. Classification by purpose/use
4. Classification by processor power
CLASSIFICATION BY PROCESS
This is a classification according to how data is processed and presented. This classification is
further sub divided into 3 classes and these are;
Digital Computers
Analog Computers
Hybrid Computers
a) Digital Computers
These are computers that process data in a form of discrete values e.g.1, 2, 3 etc. They perform
arithmetic and logical operations and examples include digital watches, petrol stations, digital
cameras etc.
b) Analog Computers
These are computers that process data in a continuous form or measurable quantities/units which
can only be measured by comparing them with other specific units. Examples include these
temperature measures, pressure pumps, speed like thermometer, voltmeter etc
c) Hybrid Computers
These are computers that have the combined features of both the digital and analog computers.
CLASSIFICATION BY PURPOSE/USE
This is a classification according to the work the computer is intend to perform/ designed for and
these include;
These are computers that are designed to perform a wide range of tasks. A typical computer of this
nature can perform calculations, keep data, tell time, word process a document, etc.
CLASSIFICATION BY SIZE
This is a classification according to the size of the machine and it depends on the user capacity that
it accommodates. It is also further divided into three sub classes and these include;
• Micro computers
• Mini computers
These are types of computers that can perform/designed to handle less tasks with minimal
processing, input and output capabilities.
In terms of user capacity, they are single user where one person can use the keyboard, the monitor
and CPU at a time. They are used in small scale organizations like office and examples range from
palmtops to desktops e.g. IBM, DELL, APPLE, TOSHIBA computers. b) Mini computers
• These can support user capacity of 50 to 500 users at a time. They are mainly used in big
organizations, hospitals, insurance companies and banks.
• They would accommodate 500 to 1000 users at ago, where by each user works separately
with a separate keyboard and monitor. They were mainly used by large multinational
companies, software houses, airline industry or central governments.
• It is now more accurate to identify the processor power in terms of clock cycle i.e. MHz or
GHz
LAPTOP
It is a computer that is portable and suitable for use while travelling. It can also be referred to as a
notebook.
Personal Computer
Robots
A robot: Is a computer-controlled device that can move and react to feedback from the outside
world
programmable computer machine some time designed in human shape like to perform
work ordinarily done by a human beings
usually have computer controlled arms (remote controls) and artificial vision inside that
enables it to manipulate and recognize different objects Robots are best used for jobs that
require;
Doing repetitive actions and jobs
Lifting heavy equipment in factories and industries.
Used to find objects under water and to explore other planets.
They are now used in medicine, for military tactics.
Robotic technology has helped people who have lost arms and legs.
The terms hardware and software are almost always used in connection with the
computer.
Computer Hardware
The hardware is the machinery itself. It is made up of the physical parts or devices of the computer
system like the electronic Integrated Circuits (ICs), magnetic storage media and other mechanical
devices like input devices, output devices etc. All these various hardware are linked together to
form an effective functional unit. The various types of hardware used in the computers, has evolved
from vacuum tubes of the first generation to Ultra Large Scale Integrated Circuits of the present
generation.
INPUT DEVICES
Input device is any hardware component used to enter data or instructions into a computer system
Input devices include
Keyboard
Mouse
Light pen
Touch screen
Modem
Microphone
Digital camera
Digitising devices
Scanners
OUTPUT DEVICES
Output device is any hardware component that can convey information to user. Data that has been
processed into a useful form, is called information. Output devices make the information resulting
from the processing available for use. The two output devices more commonly used are the printer
and the computer Monitor/ screen.
Examples
Monitors
Projectors
Printers
Speakers
Plotters
Storage medium is a physical material used for storage of data, instructions, and information for
now and future use. They are sub divided into two types i.e. primary and secondary
Memory devices
Originally Memory was formed from Vacuum tubes. Today Memory is found on SemiConductor
Silicon Chips. During processing, data is loaded and accessed from internal Memory.
Memory is measured in Form of Bytes
Micro Computer have two basic types of Computer Memory
ROM (Read Only Memory) RAM (Random Access Memory)
1 bit = (0 or 1)
1 byte = 8 bits
1 Kb = 1000 Bytes
1 MB = 1,000,000 Bytes
1 GB = 1,000,000,000 Bytes
Processing devices
The CPU is the brains of a Computer. It is in the CPU that most calculations take place, and the
CPU speed largely determines the Speed of the Computer. Processor Speed is the Time the
Computer takes to process instructions
Computer Software
The computer hardware itself is not capable of doing anything on its own. It has to be given explicit
instructions to perform the specific task. The computer program is the one which controls the
processing activities of the computer. The computer thus functions according to the instructions
written in the program. Software mainly consists of these computer programs, procedures and
other documentation used in the operation of a computer system. Software is a collection of
programs which utilize and enhance the capability of the hardware
Is the Intangible Component, the programs that tell /give instructions Computer how to
behave.
Software refers to a set of instructions provided to the computer to carry out the job required
by user.
Software means a set of logical instructions installed in the hardware to tell it what to do.
Program: A set of instructions that command a computer to do a specific task.
Therefore, the set of instructions or collection of programs that cause the Computer system to
behave in a certain way.
Application software
Application - Software consists of programs that tell a computer how to produce information.[ for
the end-user to perform tasks on the computer].
2. Special purpose: also called Tailor-made or customized packages has examples such as:
Library Mgt system, Accounts Mgt System (for banks), Automated Teller systems,
Housing/Estate management programs. I.e. they are made basing on the need and specifications
of the customer/user
A type of software developed and sold on open market to customers. For example; database
programs, word processors, spreadsheet programs, presentation programs, graphics packages,
etc.
The organization is purchasing a standard solution. A standard solution may not be well
suited to the organization‟s particular needs.
There is a high risk during implementation if the software fails to work.
Competitors may well use the same the same package, removing any chance of using IS/IT
for competitive advantage
CUSTOMIZED PACKAGE
Is a type of software specifically and specially designed to customers on order. Examples are
School Management Systems, Business transaction processing system etc.
Advantages of customized package
It is made to meet the needs of the particular user.
Change is possible with customized software.
It allows the user to perform special tasks related to their needs.
Disadvantages of customized software
It may prove costly than expected, because new versions of the standard package will also
have to be customized.
Customization may delay delivery of the software.
Customization may introduce bugs that do not exist in the standard version If done in
house, the in house team may have to learn new skills.
If done by the original manufacturer disadvantages such as those for the off- the-shelf
packages may rise.
OPERATING SYSTEM (OS)
This is a software that manages and controls computer hardware and software.
Operating systems are programs developed to manage the basic hardware systems or
resources and provide a more hospitable interface to users and their programs
It can also be defined as a program (software) that manages all the computer systems that
is to say Hardware, Software, and Human ware.
NOTE; An Interface is a Place (platform) where the hardware, Human ware, and other programs
(software) interact with one another. Examples
• Microsoft windows XP, Vista, 7, 8, Linux, UNIX, Macintosh (Mac)
• Windows XP Professional, Windows 95
• Windows 98, Windows NT workstation
• Windows 2000 professional etc.
• DOS
• Palm OS for PDAs
• Solaries for e- commerce application
• Pocket PC 2002
The operating system monitors data and information, where it‟s located in the memory. It‟s status, use late date
of recording and storage, etc. these are facilities called the file system. File systems deals with the logical
organization of the information and provide a way of sorting and sharing it through the operating system. The
operating system can also provide protection of files by use of passwords secret codes to limit access of users to
the files.
Management of computer resources.
For instance, the operating system supervises activities of the CPU and other components Providing
User Interface
A user Interface refers to the way in which the computer presents itself to the user.
UTILITY PROGRAM
These are programs that perform additional tasks to those done by the operating system. Utility programs as any
application or program allows the user to do cleaning or management on the computer system.
Examples of Utility programs / software
• Disk defragmenter (joins pieces)
This is a small but essential program that allows a user gather up all the pieces of files that have been stored in a
scattered array on the hard drive and joins them together in one efficient piece.
• Disk clean up (debugger)
This is a small but critical program that allows a user to quickly determine which file / files that: are corrupted,
no longer in use and not correctly saved on a hard disk so that they can be eliminated to create a more efficiently
operating hard drive
• Backup program.
This is a program which makes a copy of the whole computer system. This is done in security of the hard drive
crash.
• Restore program
This is a program that restores data files or may be able to return data files or a computer to its original state.
• Drive space
This is used to compress and decompress disc drives and hard disks. This increases the storage capacity from
50% to 100% more free space.
Note: this Utility should be used with care, since it could damage or destroy the contents of the compressed
drives.
• Scan disk
This is used to check files and folders for physical errors.
• Inbox repair
This is used to repair damaged files.
COMPUTER VIRUS
A program that enters a computer (usually without the knowledge of the operator) and causes harm
An insidious piece of computer code written to damage computer systems
A program designed to infect & potentially damage files on a computer that receives it.
A program /code that copies it‟s self &infect a computer without the knowledge of the user
A program designed to affect the normal performance as the entire computer systems
A harmful program that attaches itself to the computer system and destroys or corrupts data.
Types of viruses
Boot sector virus: this destroys the booting information and causes boot failure
File virus: these attach themselves on computer files and corrupt or delete them
Hoax viruses: These are internet based illusion/lies that are malicious
Trojan/Trojan horse: this is a program code that hides its identify in legitimate software
Worms: these are programs that stick in a computer memory and replicate to fill it up
Backdoor: these are programs that allow hidden access to a computer system Droppers:
these are programs that have been written to perform useful tasks but end up introducing virus in the
process of performing their functions
Failed viruses: these are viruses that have failed to meet their
goals Packagers: these hide the existence of a virus from virus guard by masking
them Test virus: these are virus written to test anti-virus software.
Time bomb: this is a virus activated on predetermined days. e.g. idi, x-mas
Joke: this is harmless program that does funny things. Your computer is about to explode please run
away..!!
Source of virus
Fake games
Infected storage devices /contaminated systems
Update of legitimate software
Free ware & share ware
Pirated software
or invoke a program from the “start” button under “All programs” Note 1: The
four sided figure you get is a window.
Note 2: A Window has Properties. File management
System that an operating system or program uses to organize and keep track of files
Most windows operating systems use a hierarchical file system and it is one that uses directories to store
files in a tree like structure inside of folders or directories
There is a root directories of the structure and then all the subdirectories are below that with
subdirectories within other subdirectories Recycle bin
Just like the name suggests it‟s a bin like a dust bin.
It holds all temporally deleted items both folder and files.
Screen saver File format
Is a standard way that information is encoded for storage in a computer file.
zip-zipped file
doc-ms word documents
xls-ms pp presentation
pub-ms publisher documents A folder:
Is a directory that can contain other folders or files within it C:\Administrator\picture
\sunset.JPG
C-Hard disk partition /location on which it is saved
My pictures-is folder that contain the file sunset.JPG
Administrator-profile of the person who created the file
Sunset-file name
JPG-File format
EXAMPLE OF A WINDOW
EXPLANATION OF THE PROPERTIES OF A WINDOW
Title Bar: This is the uppermost part of a window. It has many uses: - o Maximize or Restore a window
(double click)
o Move a window from location to location (while the window is not maximized, position the
cursor on top of the status bar, press the left mouse button down and drag to a required
position and release).
Menu Bar: This provides us with the available menu that we can use to run certain programs i.e. “File
Menu”.
Tool Bar: Shows the shortcuts of the Menu Bar.
Address Bar: This shows the address/path of the file that is currently open.
Edge of a Window: This is used to resize a window, either vertically or horizontally.
Close Button: Used to close a window.
Maximize/Restore Button: This is used to maximize or Restore the size of a window i.e.
double click.
Minimize Button: This is used to minimize a window on to the task bar.
Title Bar
Close button
Minimize button
Maximize/Rest
Vertical Scroll Bar: Used to see the extra contents that have surpassed the current size of a window
vertically up or down-wards
Window Contents: This shows the contents of a window.
Dialog boxes: A dialog box is one which contains some or all options that may be used to provide
additional information in order to accomplish a particular task. E.g.
Text boxes List boxes Check boxes Dropdown lists boxes Option buttons
FOLDER
This is a container that holds, files or other sub-folders i.e. a folder within a folder.
Note: A folder can be empty or can contain endless subfolders depending on the size of the storage device it is
created on.
Folders: Help in organizing our data in a computer into groups that are easy to access or locate.
CREATING A FOLDER
On The Desktop: Right click the desktop, choose new, then folder, type in the name of the folder and
Enter.
ON the Hard Disk (C:\): Use “My Computer” Icon, or “Windows explorer”, to locate C:\, make sure C:\
is showing its contents, click on it, then choose the “File” menu, and then
“New”, Type in the name of the Folder and press the Enter key.
FILES
Is a collection of related data given a unique name for ease of access and storage on a backing storage. A
unique name & an optional extension.
The name & extension are separated by a period (.) eg.JUNET.DOC.In this case the file name is JUNE
& the extension is DOC.Extension are used to identify the type of file, for example:doc is a word
processor file.
Note: File names consist of 3 parts o File Name o Period o Extension (one to three characters) Finding
Files and Folders Cont’d
When you‟re looking for a particular folder or file, you can use the Find command instead of opening
numerous folders.
The Find command lets you quickly search a specific drive or your entire computer.
To find a file or folder:-
Click the start button, point to search/find, and then click all files and folders. (the Find dialog box
appears)
In “all or part of the file name”, type the file or folder name you want to find.
Click the look in down arrow, or click browse to specify where to search.
COMPUTER NETWORKS
A network is a collection of computers and devices connected together
Types of Networks
Network – collection of computers and devices connected via communications media and devices such as cables,
telephone lines, modems users can share resources, such as hardware devices, software programs, data, and
information
LAN or local area network – network that connects computers in a limited geographic area e.g. computer
lab, offices, groups of buildings
WAN or wide area network – network that covers a large geographical area e.g. Districts offices of a
national corporation
PAN Personal Area Network - interconnect devices within relatively small area.
Generally within person‟s reach. E.g. Bluetooth radio
CAN Campus Area Network –spanning multiple LAN but smaller than MAN
MAN Metropolitan Area Network-spanning a physical area larger than a LAN
What is a wide area network (WAN)?
Network that covers large geographic area using many types of media. Internet is
world‟s largest WAN
Network topology
Layout of devices in a network.
A topology can either be logical or physical. A physical topology refers to the visible arrangement of
networked devices while a logical topology is the idea of how a network is arranged to exchange data.
A device that connects to the network is called a network node. It can be any device like a P.C, laptop,
printer, fax machine that receives and sends data to other networked devices.
Popular topologies are bus, ring, and star
BUS TOPOLOGY
A network arrangement where the network nodes by cable, connect to a central bus cable.
Cable forms closed ring, or loop, with all computers and devices arranged along ring. Data travels from device
to device around entire ring, in one direction
STAR NETWORK TOPOLOGY
All nodes have connections to each other. Data is routed through various alternative routes from sender to
receiver. It is a combination of star and ring topologies on the one hand
HYBRID TOPOLOGIES
The above basic topologies however can be modified to form what are called hybrid topologies.
A hybrid topology is a combination of several topologies.
These are devices or hardware components that allow the different communicating devices to access a network.
LAN devices include;
Repeaters; as signals are transmitted along network media, they loose their strength over distances and
die out eventually. A repeater is a device installed on a network link to boost or regenerate signals
weakened over the distance of transmission along the channel.
Hubs; a device on the network that centrally connects other devices on the network, through which signals
are broadcast to all other networked devices.
Bridges; a networking device that is used to separate a large network into smaller portions called
segments. It separates data that is meant for each segment.
Gateways; joins networks that are not similar. It converts different network data formats, protocols, or
transmission media so that data can cross from one network environment to another.
Switches; directs data from sender to receiver among several networked devices. It has a similar
functionality as a bridge as it filters data meant for a given network segment.
Routers; uses a routing protocol to establish the best path (route) over which data that goes across network
segments can take from sender to receiver device.
Modems (Modulation demodulation); it converts digital signals to analog signals and analog signals back
to digital signals during communication.
CABLE MEDIA
A cable is an arrangement of a given length of a core of conducting material, concentrically surrounded by a
sheath of various materials that offer insulation, protect, aid transmission or grounding to the conductor. They
include; coaxial, twisted pair cables and optical fiber.
a) Coaxial cables; is a type of copper cable specially built with a metal shield and other components
engineered to block signal interference. It is primarily used by cable TV companies to connect their satellite
antenna facilities to customer homes and businesses. They are shielded, have a lot of signal noise, provide
minimum data strength, used on network antennas.
b) Twisted pair cables (Ethernet cables); are quite literally a pair of insulated wires that are twisted together
to help reduce noise from outside sources. They contain 4 pairs of twisted wire for transmission, twisting
eliminates signal noise or signal interference from sources, can be shielded twisted pair (STP) or unshielded pair
(UTP)
c) Fiber optic cable; cables of higher transmission capacity and carry signals for longer distances as
compared to the previously discussed copper cables. Carry a higher capacity (bandwidth) of data signals, carry
signals for much longer distances before they attenuate, not susceptible to electrical interference as they base on
light
WIRELESS MEDIA
Transmits signals through the atmosphere as electromagnetic waves e.g. radio waves, infra-red radiation,
microwave, satellite system, pagers.
WI-FI network
Is a wireless Ethernet network defined in the IEEE27 802.11 standards. It ranges from 11 Mbps to the fastest at
54 Mbps, are affected by various devices with which they use the same wave frequency.
A wireless access point includes a port to connect a cable network to work along with the wireless
network.
Demerit of wireless networks is that P.C users have to buy a costly wireless adapter card to access the network.
Modern laptops are built with the network card, while older laptops required fitting a PCMCIA card.
Network range does not exceed 300 ft indoor and 1500 ft outdoor radii
Affected by devices that share the same wave frequency with the wireless network like; security gadgets,
short range Bluetooth, microwave ovens, wireless speakers and some mobile phones.
COMPUTER SECURITY
Why are we concerned about Security?
Today we are living with computer systems almost every where (and their usage is still on the
increase)
Information system designers have focused more on functionality, speed and forgotten that:
Exploitation of software bugs
Unauthorized access to resources
Masquerade as authorized user or end system
E-mail forgery
Malicious attacks Etc.
Confidentiality is the property of protecting the content of information from all users other than
those intended by the legal owner of the information. The nonintended users are generally called
unauthorized users.
Military Example
Confidentiality: target coordinates of a missile should not be improperly disclosed
Integrity: target coordinates of missile should be correct
Availability: missile should fire when proper command is issued
Commercial Example
Confidentiality: patient‟s medical information should not be improperly disclosed
Integrity: patient‟s medical information should be correct
Availability: patient‟s medical information can be accessed when needed for treatment
Other basic security properties are the Authentication and the Non-repudiation . Authentication is divided into
peer-entity authentication and data-origin authentication.
Detailed treatment of security properties can be found in several security standards, such as the ISO/IEC 7498-2
and the ITU-T X.800 security recommendation.
In a practical information technology approach, security involves the protection of assets. Assets may be:
However,
The information assets must be protected against security threats.
A security threat is any event that may harm an asset.
When a threat is realized, then, the IT system or network is under a security attack.
The attacker or threat agent is any subject or entity that causes the attack.
An example of a threat agent in a computer network is a malicious outsider (external user) who attempts
to bypass security measures and access the network.
A threat which may be caused by such an attacker is unauthorized access to network resources.
A security vulnerability is any characteristic in a system, which makes one or more assets vulnerable to
threats .
In the above example of a threat, a security vulnerability which exposes the system to unauthorized access
is the lack or the misconfiguration of access controls.
If access to the network is not properly controlled with well configured mechanisms, then it will be easier
for a possible attacker to gain unauthorized access into the system and the network is more vulnerable to
intrusion attacks.
The impact of the threat measures the magnitude of the loss that would be caused to the asset or asset
owner if threats were realized against it. The magnitude of loss is closely related with the operational or
business value of the attacked asset.
The combination of threats, vulnerabilities and assets provides a quantified and/or qualified measure of
the likelihood of threats being realized against assets, as well as the impact caused due to the realization
of a threat. This measure is known as the security risk.
The protection of assets can be achieved through several security mechanisms.
A security mechanism is any type of measure, (technical, procedural, legal etc) which may protect an
asset from security threats, reduce their vulnerability and more generally reduce the level of security risks.
A security mechanism may be:
Preventive, if its goal is to prevent the realization of a security attack. Such mechanisms mainly reduce
the threat level of security attacks.
Detective, if its goal is to detect a security attack as fast as possible and thus restrict the consequences of
the attack. These mechanisms mainly reduce the vulnerability level of security attacks.
Recovery, if its goal is to recover the system after a security attack in the shortest possible time. These
mechanisms mainly reduce the impact level of security attacks.
THE INTERNET
It is a global system of interconnected computer networks. It uses a combination of protocols known as
Transmission Control Protocol/ internet protocol (TCP/IP).
Domains; these divide WWW sites into categories based on the nature of their owner, and they form part
of a site‟s address, or the URL .
Intranet; a network within an organisation that only allows internal users share resources. Organisations
use it to share information amongst employees and departments.
Extranet; an intranet network that allows authorised extranal users to access its resource. Organisations
with such a network allow external stake holders use the network service, like customers and suppliers
with authority.
IP (internet protocol); are sets of rules which determine how information is delivered between networked
devices. It is not responsible for data moving out of the network and does not guarantee data delivery.
TCP (Transmission Control Protocol); are sets of rules that provide connection oriented
communications. It guarantees delivery of data between the connections and is responsible for reporting
errors when data has not been transmitted successfully.
Telnet; this is a protocol that allows a computer user to connect to other remote computers. Enables one
to log on to a remote computer/ machine and use it.
ELECTRONIC MAIL(E-MAIL)
Is a text message sent and received over the World Wide Web(WWW). In order for one to send and receive e-
mail he or she must have an e-mail account or address.
Elements that make up an e-mail account.
Username
Domain address
@ sign between the username and domain address
A password
An extension e.g. .com, .uk, .ug, etc
Negative impacts/effects
Theft of personal information; when using an unsecure connection, there is a high possibility that your
personal details such as credit card number, bank account info, etc may be accessed by con artists
Virus threat; computers on the internet are very prone to virus attacks, which may lead to crushing of
hard disk or data loss
Spamming; unwanted/ unsolicited e-mail in bulk are very frustrating as they make the internet
connection very slow and unreliable
Easy access to pornography; un restricted access to porn may have a bad influence on the mental
health especially in teens/ children. It may also play a havoc in marital and social lives of adults.
Social disconnect; when many people are engulfed in a virtual world of socialization, this may lead to
drifting apart of friends and family members.
REVISION QUESTIONS
1. What is meant by the term internet?
2. Mention any five services provided by the internet.
3. What are the impacts/ effects of computers to the society.
4. With an example, describe the main parts of an e-mail address
5. State the functions of the following fields as used in e-mails
i. To
ii. Subject
iii. Carbon copy iv. Blind carbon copy
v. Attachment
3. Computer crime is the “misuse” of computers and peripherals in a way that can cause destruction or
breakdown of the hardware and or software.
Computer Abuse
Computer abuse means wrongful use of computers and peripherals. Computer abuse may not necessarily lead to
a breakdown of the computer system.
Surfing during company time this is using the company Internet facilities to surf and send personal
emails during the company time.
Playing games. Using the computer facilities during the company hours to play games such as Pachisi,
Solitaire, Free cell etc.
Viewing the computer files, facilities, and the internet during lecture time and constantly disturbing the
lecturer when the lecture is going on.
Wrongful shutting down of computers. This is whereby a computer user turns off the computer without
shutting it down.
Leaving the computer on for long hours. This is especially when the computer is not in use, for example
leaving the computer on over night.
Hitting the computer. whereby a lot of force is used on the computer, for example on the keyboard.
This can also include intentional hitting of the computer.
Spreading viruses; Transferring viruses from one computer to another using storage devices like
memory sticks and floppy disks.
Downloading infected files Downloading file attachments that are infected with viruses from the Internet
Invisibility/Anonymity of offender
Unwillingness to report