Computer Security Handout
Computer Security Handout
Computer Security: refers to the measures taken to protect a computer's hardware and software from
unauthorized access or damage.
Cybersecurity: The practice of protecting systems, networks, and programs from digital attacks. Eg.
hacking, Ransomware, Spyware etc.
Computer Misuse
Misuse is the use of computers to do harmful acts. Examples are:
Cyber bullying: involves using digital platforms/websites to harass, threaten, or embarrass someone.
Copyright infringement: occurs when someone uses copyrighted material without permission
Data theft: is the unauthorized access and retrieval of sensitive information.
Denial of service attacks: overwhelms a system, making it unavailable to users
Viruses and malware: are harmful software that can damage computers and networks.
Identity theft: the unauthorized taking of sensitive information.
Phishing attacks: tricking individuals into providing personal info through fake emails or websites.
Software and music piracy: illegal copying and distribution of software and music
Financial abuses: fraudulent activities that exploit financial systems for personal gain.
Violation of privacy: This occurs when personal information is accessed without consent.
Electronic eavesdropping: unauthorized listening to private communications.
Industrial espionage: Companies spying on each other
- Software Measures:
- Effective Passwords Strong passwords (use of symbols and numbers in password
-Two Factor Authentication: Requires two forms of IDs eg. Enter password and code
1. Firewall ______________________________
2. Security Cameras ______________________________
3. Biometric Access Control ______________________________
4. Intrusion Detection System (IDS) ______________________________
5. Data Encryption ______________________________
6. Server Room Locks ______________________________
7. Antivirus Software ______________________________
8. Multi-Factor Authentication (MFA) ______________________________
9. Regular Software Updates ______________________________
10. Employee ID Badge Access _____________________________
11. Secure Network Configuration ______________________________