SOCIAL AND ECONOMIC IMPACT OF
INFORMATION AND COMMUNICATIONS
TECHNOLOGY (ICT)
IMPLICATIONS OF
CYBERSECURITY
Lesson Objectives
At the end of the class, students should be able to:
1. Differentiate cyber security and computer security.
2. State the elements that can be used to assess cyber security
and computer security
3. Differentiate data integrity and data security
4. State how data can be secured against misuse or being
corrupted
The importance of securing computer systems, their data and
their network access to the Internet cannot be overstated.
There are 2 methods to do this ….
Cyber security Computer security
Cyber security
Focuses on stopping threats that attempt to access a computer or other
systems in the network.
Computer security
Refers to the protection of hardware and software resources against
their accidental or deliberate damage, theft or software corruption.
Elements (factors) used to assess cyber and computer security
★ Vulnerability - this is a weakness/flaw in one or more computer systems or
connectivity to computer systems ... Pg 79
★ Threat - this is a negative action or event that can occur from the vulnerability if
the computer is not properly secured... Pg 79-80
★ Attack - this is any attempt to illegally access a computer or network in order to
expose, steal, alter, disable, destroy or to gain control. Pg 80
★ Countermeasure - this is an action, technique, device or procedure that is used
to mitigate the event from happening … pg 84
■ Using a password; antivirus software; reducing the number of persons who have access to
computer systems.
Whether a threat is deliberate or accidental, all methods should be
taken to prevent it from occurring or to minimise its effects.
Data protection - refers to computer users who can protect their data
against loss and damage… pg 84. This is accomplished in TWO ways.
● Data Integrity
● Data Security
• DATA INTEGRITY
• This is the quality
and content of data; • DATA SECURITY
it ensures that • Protects data from
information is prying eyes,
accurate, up-to-date criminals,
and legitimate. malicious persons
and accidental loss
or damage.
HOW CAN DATA BE PROTECTED?
PERSONAL RESTRICTIONS
❖ Do not give out passwords
❖ Do not connect to unknown Wi-Fi
❖ Be careful of the websites you visit while
browsing
❖ Check the connection (http vs https)
HOW CAN DATA BE PROTECTED?
• SOFTWARE • PHYSICAL
RESTRICTIONS RESTRICTIONS
• Backup and recovery
• Passwords procedures
• Archiving
• Biometric systems
• Encryption • Locks and security
• Firewall guards
• Fireproof and waterproof
cabinets
SOFTWARE RESTRICTION
• This creates barriers to data corruption, restrict
access to software that may contain sensitive data
or to software that can cause damage.
• PASSWORDS: This is used to control access to
data. Its is a combination of characters that must
be entered before you can access, view or edit data.
• The most secured passwords are a combination of
letters, symbols and numbers.
• ENCRYPTION: is the process of using an algorithm to
transform information to make it unreadable (encrypt) for
unauthorized users. The data must be decrypted using a key.
• EXAMPLE
• Encrypted data received = 16 1 25 1 20 20 5 14 20 9 15 14
• Key = > A = 1; B = 2; C = 3; D = 4; E = 5……
• Decrypted message ?
• FIREWALL: are designed to protect a computer by blocking certain
programs from sending and receiving information from a local network
or the Internet.
• Eg: Windows Firewall
• Therefore ::
Firewall is used to protect networks from unauthorized access, while
permitting legitimate transmissions to go through. On the other hand,
Antivirus software is used for the prevention, detection and removal of
malware.
• VIRUS PROTECTION (ANTI-VIRUS) Software: Protects against
viruses. It locates known viruses on a computer or looks for software that
acts like a virus. New viruses are created all the time, so keep your antivirus
software up-to-date.
• Malware: Software designed to harm your computer
• Virus: A virus is a piece of software intended to cause harm to a
computer or to gain access to confidential data. It replicates and spread
easily from computer to computer via programs.
• Software Worm: A piece of software that attaches to
computer memory where is consumes all the system’s
resources, slowing or halting other tasks.
• Trojan Horse: It looks and behaves like a genuine program
but once it is running, it allows hackers to gain access to the
computer steals data and sends it to the person who made
the malware. (Bank account #, passwords, credit card
information.)
RECAP
SCENARIOS OF DATA CORRUPTION
a) An employee opened an e-mail
RESTRICTIONS {to
attachment that launched a program and
caused his computer to crash. _________ prevent}:
b) An employee used another person’s • Password
computer without their permission and • Encryption
accidentally deleted important files. _____
• Antivirus
c) A hacker gained access to a computer on software
a network and may have copied
confidential data. __________ • Firewall
d) An employee read confidential salary
information about her co-workers in a
document. _________
PHYSICAL RESTRICTIONS
• This is the protection of important data from physical actions
and events that could cause serious loss or damage to a business
or institution. This includes protection from fire, flood, natural
disasters, burglary, theft, vandalism and terrorism.
• BACKUP AND RECOVERY PROCEDURES: Store a second
copy of the files and programs away from the computer.
Secondary storage devices can be used for this purpose.
• ARCHIVING: This is similar to back up except it is more
commonly used for very old data. The data may take up a lot of
space on a hard drive or server. So it is archived in another
location.
• BIOMETRIC SYSTEMS: For security reasons, a computer or even
a building can control access to entry by storing the
fingerprints/retina/facial features of authorized persons on a central
system then checks against its records for authorization.
• LOCKS & SECURITY GUARDS: Computers and other peripherals are
easily stolen, as a result, security measures must be implemented:
• Computer cable locks – allow for a lock that is chained to a desk
• Securing doors and windows – grill
• Securing premises, preventing theft or damage – Security guards
• Documents and other stationery – locked away in a safe of locked
drawer
• FIREPROOF AND WATERPROOF CABINETS:
Fireproof cabinet is a cupboard or storage area that does not get burned
by fire or damaged by heat.
A waterproof cabinet protects its contents from being damaged by
water.