0% found this document useful (0 votes)
20 views12 pages

NOTES

Uploaded by

dollarwestern99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views12 pages

NOTES

Uploaded by

dollarwestern99
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

COMPUTER SECURITY

DEFINE THE FOLLOWING TERMS:


1. COMPUTER SECURITY
2. DATA SECURITY
3. PRIVATE DATA
4. CONFIDENTIAL DATA
5. DATA CONTROL
6. THREATS
Computer Security: Computer security
refers to the protection of computer systems
and networks from unauthorized access,
cyberattacks, or damage that could disrupt
their operation or compromise the
confidentiality, integrity, or availability of
data. It involves implementing various
measures such as firewalls, antivirus
software, encryption, and user
authentication.
Data Security: Data security is the
practice of protecting digital
information from unauthorized access,
corruption, or theft throughout its
lifecycle. This includes the use of
encryption, access controls, and secure
data storage solutions to prevent data
breaches and ensure data privacy.
Private Data: Private data, also known as
personal data, includes information that can
identify an individual, such as names,
addresses, phone numbers, email addresses,
and other details unique to a person. This
type of data is subject to strict privacy laws
and regulations, which aim to protect
individuals' personal information from
misuse.
Confidential Data: Confidential data is
sensitive information that is intended to be
kept private and only accessible to
authorized individuals or entities. Examples
include trade secrets, business plans,
financial records, and other proprietary
information that, if disclosed, could
negatively impact an organization or
individual.
Data Control: Data control refers to the
policies, practices, and mechanisms in
place to manage the collection, storage,
sharing, and use of data within an
organization. It includes enforcing data
privacy, ensuring data integrity, and
limiting access based on user roles to
maintain data accuracy and prevent
unauthorized access.
Threats (Risks) are potential dangers or risks that could
exploit vulnerabilities in a system, network, or application to
cause harm. Threats may lead to unauthorized access, data
loss, financial loss, or disruption of operations. These can
originate from various sources, including external attackers,
internal users, system flaws, or environmental factors, and can
be classified as intentional (e.g., cyberattacks) or unintentional
(e.g., accidental data leaks).Common types of threats include
malware, phishing attacks, insider threats, social engineering,
and natural disasters, among others. Addressing these threats
involves identifying potential risks and implementing security
measures to prevent, detect, or mitigate their impact.
Viruses: A virus is a type of malicious
software (malware) that attaches itself to a
legitimate program or file. Once the infected
file or program is executed, the virus
replicates and spreads to other files or
programs on the system, potentially causing
damage or slowing down performance.
Viruses often require human action to spread,
such as opening an infected file or program.
Trojan Horse: A Trojan horse, or simply
"Trojan," is malware disguised as legitimate
software or embedded within legitimate-
looking files. Unlike viruses and worms, a
Trojan does not replicate itself but instead
relies on users to install or activate it, often
unknowingly. Once active, Trojans can create
backdoors, steal data, or grant unauthorized
access to the attacker, allowing them to control
the system remotely.
Worms: Worms are standalone malware that
self-replicate and spread without the need for a
host file or human action. They exploit network
vulnerabilities to infect other devices, often
causing widespread damage across a network.
Unlike viruses, worms can spread automatically
by scanning for other vulnerable systems to
infect, consuming network resources and
potentially causing network slowdowns or
failures.
In summary:
Virus: Attaches to files, spreads with
user action, can cause damage.
Trojan Horse: Disguised as legitimate
software, does not replicate, grants
unauthorized access.
Worm: Self-replicates, spreads
automatically, often affects networks.

You might also like