0% found this document useful (0 votes)
0 views4 pages

Chapter 5

Information and computer security, also known as InfoSec and cyber security, focuses on protecting information and computing devices from unauthorized access and threats. It encompasses various aspects including data privacy, security threats, and prevention strategies such as firewalls and antivirus software. The document emphasizes the importance of understanding these concepts to safeguard personal and organizational data from cyber-attacks and unauthorized exploitation.

Uploaded by

getu zerga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views4 pages

Chapter 5

Information and computer security, also known as InfoSec and cyber security, focuses on protecting information and computing devices from unauthorized access and threats. It encompasses various aspects including data privacy, security threats, and prevention strategies such as firewalls and antivirus software. The document emphasizes the importance of understanding these concepts to safeguard personal and organizational data from cyber-attacks and unauthorized exploitation.

Uploaded by

getu zerga
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 4

Information and computer security.

Information Security

Information security is one of the most important and exciting career paths today

all over the world. Information security is simply referred to as InfoSec, which is

the practice of defending information from unauthorized access, use, disclosure,

disruption, modification, perusal, inspection, recording or destruction.

Computer Security

Computer security, also known as cyber security, is about information security as

applied to computing devices such as computers and smartphones as well

as computer networks such as private and public networks including the whole

Internet. It is a method for ensuring data that has been stored in computer systems

could not be read or compromised by any individuals without authorization.

Traditionally, information technology (IT) facilities have been protected for three

reasons:

ƒ To prevent theft of or damage to the hardware.

ƒ To prevent theft of or damage to the information.

ƒ To prevent disruption of service1

Impact of Information and Computer Security on Society

Information and computer security risks arise from the intentional or unintentional

misuse of computers and network resources as well as the Internet. These risks

may result in the loss of or damage to computer hardware, software, confidential

information and data integrity as well as network and Internet availability.

Hackers can do several things from stealing your passwords to controlling

your computer through remote access. So, every student and another computer

user must know about information and computer security. Remember that
violation of information and computer security is punishable. 2

Privacy is concerned with safeguarding and respecting people’s rights to manage their data in a broader
sense. Individuals should have the right to access – if they ask for it – as well as the opportunity to
modify or erase erroneous information about themselves that firms maintain in databases according to
privacy activists.

Privacy, like security, is crucial because it prevents data. Security is concerned with information leaks
caused by malware infections and data breaches whereas privacy is concerned with personal data rights
in terms of how information is acquired, utilized and maintained as well as who has access to it.

Data Privacy

Data privacy or information privacy is concerned with proper handling, processing, storage and usage of
personal information. It is all about the rights of individuals concerning their personal information.2

Data Security

Data security is concerned with measures that an individual or organization is taking to prevent any third
party from unauthorized access. 2

Computer Security Threats

A security threat is a malicious act that aims to corrupt or steal data or disrupt school or organization
systems. Security event refers to an occurrence during which school data or its network may have been
exposed. An event that results in a data or a network breach is called a security threat. Some of the
computer security threats are computer viruses, computer worms, Trojan horses, spyware, adware and
ransomware.2

Threat Prevention Strategies

Several defensive strategies and tools have been developed to assist in preventing threats. These
include encryption, firewalls, anti-virus software, biometric security, user identification and passwords,
security monitors and disaster recovery. 2

Firewall

A firewall is a network security device that monitors incoming and outgoing network traffic and decides
whether to allow or block specific traffic based on a defined set of security rules.A firewall program does
not protect you from all viruses, so it is necessary to install an antivirus or antimalware application. 2

Antivirus Software

Antivirus software is a type of program designed and developed to protect computers from malware like
viruses, computer worms and spyware. Antivirus programs function to scan, detect and remove viruses
from your computer.2
User Accounts and Description

Administrator

Administrators have access to everything on the computer, and can make changes to anything, such as
installing software and changing security settings. When you first install Windows 10, the initial user
account will be an administrator account. The administrator account can also create new users and
manage

Standard

Standard users will have limited ability to make changes to the computer, except for personalizing the
computer, such as applying a screen saver or changing a theme. Standard users will not have access to
other users’ personal files and folders. Most computer users will be allocated a standard account.

Guest

Guest accounts exist for temporary users of a computer and only one guest account can exist on a
computer. Guest accounts are similar to standard accounts, except there is no privacy, as anybody can
log onto a guest account. The guest account provides access to installed programs but does not have
permission to access data in other users’ personal folders. Guest accounts are often used in internet
cafes.3

Non-technical Prevention Strategies.

It is impossible to prevent natural disasters, but it is possible to reduce the damage they inflict through
careful planning. Some measures can be taken to reduce their impact. The measures that you can take
to protect your data and computer from natural threats could be keeping your computer in a secure
location, storing data safely and protecting programs and data.3

Cyber Security

Cyber security is the application of technologies, processes and controls to protect systems, networks,
programs, devices and data from cyber-attacks. Cyber security aims to reduce the risk of cyber-attacks
and protect against the unauthorized exploitation of systems, networks and technologies.3

Cyber-attacks can cause electrical shutdowns, failure of military equipment and breaches of national
security secrets. They can result in theft of valuable, sensitive data like medical records. They can disrupt
phone and computer networks or paralyze systems, making data unavailable.

Cyber security applies in a variety of contexts, from business to mobile

computing, and can be divided into a few common categories. Such as network security applications,
information security, operational security, disaster recovery and end-user education. Common ways of
cyber-attack prevention can be outlined as the follows.
1. Use strong passwords

2. Secure your computer

3. Be social-media savvy

4. Secure your mobile devices

5. Install the latest operating system updates

6. Protect your data

7. Secure your wireless network4

You might also like