IT-UNIT-5 Information and Computer Security
IT-UNIT-5 Information and Computer Security
INFORMATION
AND COMPUTER
SECURITY
Security:
• Being safe and protected
• Freedom from danger
• Freedom from fear or worry.
In General Security is
Protection and
measures to prevent
sabotage, crime,
attacks.
• Information Network Security
Agency (INSA) የመረጃ መረብ
ደህንነት አስተዳደር)-
Protects national interests by
securing the country's
information and information
infrastructure.
• INSA: National agency
focused on cyber security.
Computer Security: Protects
systems and data from harm,
theft, or misuse.
• Unauthorized Use: Accessing
a system or data without
permission.
Types of computer security
Information Security:
• Protects data from unauthorized
access, changes, or deletion.
Example:-
What if someone changed your
marks using your teacher’s laptop?
Computer Security
• (also called Cybersecurity)
refers to the protection of
computer systems and
networks from information
disclosure, theft, damage, or
disruption.
Application security:
• Protecting apps by
adding features to
prevent cyber threats.
Mobile and Computer
Security:
•Protecting devices by
keeping them
updated.
Network security
Protects software and
hardware using tools like
firewalls. Includes cloud
and IoT security.
Cybersecurity
• Protecting computer
systems connected
through networks.
Principles of Computer
Security (CIA):-
• Confidentiality
• Integrity
• Availability
Confidentiality
Keeping data private.
Information is accessed
and modified only by
authorized users,
preventing unauthorized
third-party access.
Integrity
Ensuring data is accurate and
unchanged.
• Protects against unauthorized data
changes or destruction.
• Ensures authenticity, non-repudiation,
and data trustworthiness.
• Data must remain accurate, authentic,
and reliable.
Availability
Making data accessible when
needed.
Ensuring information is available
to authorized users whenever
they require it.
Ensuring timely and reliable
access to and use of information.
5.3 Computer Security
Threats
•Ethiopia is becoming more
connected through mobile
phones and data.
•This interconnection exposes
users to various computer
security threats.
Cont.……
•Computer threats can be natural
(like disasters) or manmade (like
hacking), and come from internal
(within an organization) or
external (outside) sources.
•Understanding these risks is
essential for staying safe in today’s
digital world.
INTERNAL THREATS
Threats emerging within an institution, company, or
business.
• Examples:
– Employee misconduct
– Data breaches by insiders
– Poor internal controls
– System failures
• Causes:
– Environmental: Power outages, building issues
– Technical (Manmade): Human error, sabotage,
misconfigured systems
EXTERNAL THREATS
• Threats coming from outside the organization.
Examples:
– Cyberattacks (hackers)
– Competitor actions
– Natural disasters
– Supply chain disruptions
• Causes:
– Environmental: Earthquakes, floods, storms
– Technical (Manmade): Malware, phishing,
infrastructure attacks.
Types of computer security attacks
• Types of Computer Security Attacks
• Malicious (Harmful) Attacks
– Intentional attacks meant to damage, steal, or
disrupt.
– Examples:
• Viruses, worms
• Ransomware
• Phishing
• Denial of Service (DoS) attacks 9C1
• Non-Malicious Attacks (No
Damaging Effect)
–Not intended to harm; often
unintentional.
–Example:-
• Testing systems without harmful
intent
• Accidental Attacks (Due to
Mistake)
–Caused by human error or lack of
knowledge.
–Examples:
• Deleting critical files accidentally
• Misconfiguring security settings
• Sending data to the wrong person
Aspect Malicious Non-Malicious
Mistaken deletion,
Hacking, viruses, phishing,
Examples misconfiguration,
ransomware
unintentional data leak
THE END
UNIT -6
FUNDAMENTALS
OF PROGRAMMING
6.1 Defining a Problem and Computational Problem
• A problem is a challenge or difficulty we face in everyday
life.
• It can be something hard to understand, difficult to solve,
or involves doubt and uncertainty.
• Problems exist in both personal and business activities.
• A computational problem is a type of problem that can
be solved using computers or software.
• It involves defining the input, process, and output clearly
so that a computer can help solve it.
• Examples:
– Sorting a list of names
– Calculating a budget
– Searching for information online
6.1 Defining a Problem and Computational Problem
• Importance
• Computers and application software
help make solving daily problems
easier and faster.
• Without software, many tasks would
be more time-consuming and
complicated.
Cont.…
• Computational problems:
– Problems solvable step-by-step by a computer.
– Have well-defined inputs, constraints, and
output conditions.
– Require clear instructions and rules for a
solution.
• Key point:
– Some problems need human engagement and
leadership, while computational problems can
be handled algorithmically by computers.
Decision problem
• Counting problem
– Find the number of solutions to a search
problem.
– Example: Count female students in Grade 9.
• Optimization problem
– Find the best possible solution based on criteria.
– Example: Compute the fastest route between
locations.
– Related to network routers that find best routes
for sending data.
Computational problem: