0% found this document useful (0 votes)
6 views2 pages

Computer Security Handout

Computer security involves protecting hardware and software from unauthorized access and damage, while cybersecurity focuses on defending systems against digital attacks. Key elements include vulnerabilities, threats, attacks, and countermeasures, with misuse examples like cyberbullying and identity theft affecting individuals, organizations, and governments. Countermeasures to reduce threats include physical measures like backups and biometric access, and software measures such as strong passwords and encryption.

Uploaded by

suwayne.84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views2 pages

Computer Security Handout

Computer security involves protecting hardware and software from unauthorized access and damage, while cybersecurity focuses on defending systems against digital attacks. Key elements include vulnerabilities, threats, attacks, and countermeasures, with misuse examples like cyberbullying and identity theft affecting individuals, organizations, and governments. Countermeasures to reduce threats include physical measures like backups and biometric access, and software measures such as strong passwords and encryption.

Uploaded by

suwayne.84
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

What is Computer Security?

Computer Security: refers to the measures taken to protect a computer's hardware and software from
unauthorized access or damage.
Cybersecurity: The practice of protecting systems, networks, and programs from digital attacks. Eg.
hacking, Ransomware, Spyware etc.

Elements of Computer Security


-Vulnerability: A weakness in a system that can be exploited.
- Threat: Any potential danger to information or systems.
- Attack: An attempt to exploit a vulnerability.
- Countermeasure: Actions taken to prevent or mitigate attacks.

Computer Misuse
Misuse is the use of computers to do harmful acts. Examples are:
Cyber bullying: involves using digital platforms/websites to harass, threaten, or embarrass someone.
Copyright infringement: occurs when someone uses copyrighted material without permission
Data theft: is the unauthorized access and retrieval of sensitive information.
Denial of service attacks: overwhelms a system, making it unavailable to users
Viruses and malware: are harmful software that can damage computers and networks.
Identity theft: the unauthorized taking of sensitive information.
Phishing attacks: tricking individuals into providing personal info through fake emails or websites.
Software and music piracy: illegal copying and distribution of software and music
Financial abuses: fraudulent activities that exploit financial systems for personal gain.
Violation of privacy: This occurs when personal information is accessed without consent.
Electronic eavesdropping: unauthorized listening to private communications.
Industrial espionage: Companies spying on each other

Who is affected bv Computer Misuse and how are they affected?


-Individuals: (1) Cyber bullying can lead to emotional distress.
(2) Identity theft can lead to financial loss.

-Organizations:(1)Data theft can compromise sensitive information.


(2)Denial of service attacks can disrupt business operations .

-Governments: (1)Cyber attacks can threaten national security.


(2)Electronic eavesdropping can violate citizens' rights.
Countermeasures to reduce Threats
There are two categories of Counter measure Physical and Software.
Physical Measures:
- Backup/Recovery:Save data in case of a loss by keeping a copy of the data in a another location.
- Intrusion Detection Systems: Monitor network traffic for suspicious activity.
- Biometrics: Use body parts like fingerprint or Iris to grant access to system.

- Software Measures:
- Effective Passwords Strong passwords (use of symbols and numbers in password

-Two Factor Authentication: Requires two forms of IDs eg. Enter password and code

- Encryption of Data:Encryption protects data by converting it into a code.

- Antivirus and Malware Detection:Protect systems from malicious software.

Other Practices include:

 verifying authenticity of email from companies or individuals,


 checking website URLs for authenticity,
 limiting access to open Wi-Fi networks, securing mobile devices,
Graded Activity
Below is a list of cybersecurity and countermeasures.Classify each as either Physical
or Software-Related by placing them in the correct category.

1. Firewall ______________________________
2. Security Cameras ______________________________
3. Biometric Access Control ______________________________
4. Intrusion Detection System (IDS) ______________________________
5. Data Encryption ______________________________
6. Server Room Locks ______________________________
7. Antivirus Software ______________________________
8. Multi-Factor Authentication (MFA) ______________________________
9. Regular Software Updates ______________________________
10. Employee ID Badge Access _____________________________
11. Secure Network Configuration ______________________________

You might also like