S4 Computer Studies Notes TRENDS in COMP
S4 Computer Studies Notes TRENDS in COMP
Defn
COMPUTER INTEGRITY AND SECURITY
SOFTWARE INTEGRITY
Software integrity refers to methods of ensuring that software is real, accurate and
safeguarded from unauthorized user modification.
HARDWARE INTEGRITY
Hardware Integrity to methods of ensuring that hardware is safeguarded from
unauthorized access and modification.
COMPUTER INTRUSION
Computer intrusions/Attacks occur when someone tries to gain access to any part
of your computer system. Computer intruders or hackers typically use automated
computer programs when they try to compromise a computer’s security.
There are several ways an intruder can try to gain access to your computer. They can:
Security is the ability of a system to protect information and system resources with
respect to confidentiality, availability and integrity.
Major Threats.
Knowing how to identify computer security threats is the first step in protecting
computer systems. The threats could be intentional, accidental or caused by natural
disasters.
Security Threat is defined as a risk that which can potentially harm computer
systems and organization. The cause could be physical such as someone stealing a
computer that contains vital data. The cause could also be non-physical such as a
virus attack.
a) Physical threat
b) Non physical threat
A physical threat is a potential cause of an incident that may result in loss or physical
damage to the computer systems.
Employees are responsible for more successful intrusions than outsiders. It becomes
very difficult to find the source of internal attacks without alerting the attacker that
you suspect him of wrong-doing.
The following list classifies the physical threats into three (3) main categories;
Internal: The threats include fire, unstable power supply, humidity in the
rooms housing the hardware, etc.
The following list shows some of the possible measures that can be taken:
Internal threats:
a) Fire threats could be prevented by the use of automatic fire detectors and
extinguishers that do not use water to put out a fire.
b) Housing computer systems in high lands are one of the possible ways of
protecting systems against floods.
Humans threats:
o Threats such as theft can be prevented by use of locked doors and
restricted access to computer rooms.
The non-physical threats are also known as logical threats. The following list is
the common types of non-physical threats;
Virus
Trojans
Worms
Spyware
Key loggers
Adware
Denial of Service Attacks
Distributed Denial of Service Attacks
Unauthorized access to computer systems resources such as data
Phishing
Other Computer Security Risks
The following list shows some of the possible measures that can be taken to protect
cyber security threats
To protect against viruses, Trojans, worms, etc. an organization can use anti-
virus software. In additional to the anti-virus software, an organization can also
have control measures on the usage of external storage devices and visiting the
website that is most likely to download unauthorized programs onto the user’s
computer.
Summary
Non-physical threats target the software and data on the computer systems.
COMMON THREATS
It becomes difficult to protect our systems from the people who need to use it
day in and day out.
Several groups of Internet users out there that will attack information systems.
a) A root kit
b) Alterations
c) Autorun worms
d) Boot sector malware
e) Cookies
f) Cracking
g) Email spoofing
h) Hoaxes
i) Key logging
j) Malware
k) Parasitic viruses
l) Patches
m) Phishing
n) Privacy and Fraud
o) Ransom ware
p) Sabotage
q) Social engineering
r) Social networking websites
s) Spam
t) Spear phishing
u) Spyware
v) Tapping
w) Tracking
x) Trespass
y) Worms
d) Auto run worms are malicious programs that take advantage of the Windows
Auto Run feature. They execute automatically when the device on which they
are stored is plugged into a computer.
e) Boot sector malware spreads by modifying the program that enables your
computer to start up.
f) Cookies are files placed on your computer that allow websites to remember
details.
g) Email spoofing is when the sender address of an email is forged for the
purposes of social engineering
n) Ransom ware is software that denies you access to your files until you pay a
ransom
p) Social engineering refers to the tricks attackers use to fool victims into
performing an action. Typically, these actions are opening a malicious webpage
or running an unwanted file attachment.
r) Spamming is the use of electronic messaging systems like e-mails and other
digital delivery systems and broadcast media to send unwanted bulk messages
indiscriminately. An unsolicited messages is what we call spam
w) Trespass: when someone is able to access your computer and able to see or use
your files illegally.
x) Worms are viruses that create copies of themselves across the Internet or local
networks.
Protection Measures
Educate users
Encrypt all important data
Use secure passwords
Implement additional security checks (fingerprint, Eye scanners)
Encrypt all important data
Restrict Plug and Play
COMPUTER ETHICS
Computer ethics are the moral guidelines that govern the use of computers and
information systems. Frequently concerned areas of computer ethics are;
- Unauthorized use and access of computer systems.
- Software piracy
- Information privacy
- Intellectual property rights
- Codes of conduct
(a) Unauthorized access and use of computer systems. Unauthorized access
is the use of a computer or a network without permission.
A cracker or a hacker is someone who tries to access a computer or a
network illegally. Some hackers break into a computer for the challenge.
However, others use or steal computer resources or corrupt a computers’ data.
(b) Software piracy. Software piracy refers to the unauthorized and illegal
duplication of copyrighted software. Software piracy is the most common
A software site license gives the buyer the right to install the software on
multiple computers at a single site. (e.g a school computer laboratory)
A network site license allows network users to share a single copy of the
software which resides on the network server.
Risks of software piracy
(e) Intellectual property rights. Intellectual property (IP) refers to work created
by inventors, authors and artists.
Intellectual property rights are the rights to which creators are entitled for
their work.
The study of computer studies has become too rich that it is now getting had to
draw a difference between Computer Studies and “ICT”.
Computers and communication have brought and still bringing changes in our
lives. Therefore, the following concepts are more or less becoming family names.
Information technology
The communication revolution/Telephone revolution
Internet revolution
Multimedia (data, sound & video)
The Binary Age
Information society
The information super high way/ “Information” or I-way or Data-Way.
The digital Age or Dot Age.
The need for better and best ways of doing things has triggered more and more
research in the best technologies, more reliable information, and the best
communication means.
a) BENEFITS/ADVANTAGES OF INFORMATION
TECHNOLOGY.
Widens the gap between the rich and the poor as the rich producing with the
help of ICTs produce faster and flood the markets.
Isolate older people since it is not very easy for them to cope with the many IT
changes.
Bombards (internet) people with too much information- (good and bad)
Increased instability as people get compelled to learn new things every now and
then.
Health problems e.g. eye sight losses, repetitive strain injury, etc
Moral problem through access of pornographic materials on the net.
Erosion of individual privacy as more data about people is stored on databases
and can be accessed any time.
Unemployment as less skilled people get retrenched and their roles taken over
by more effective ITs.
Addictions to computer games plus surfing by young people
ITs isolate man and also erode the social aspect of work as some people opt for
executing their office duties from their homes.
Initial, maintenance and on-line IT costs are very high seggregative.
Virus threats make data stored on computers very insecure.
Increased crime through forgeries, piracy, etc.
Education references soft ware e.g. the Infopedia, Encarta, etc are programs
used for helping people with English usage, data collection and analysis etc
ITs have got immense internal and external storage devices for storage of
huge volumes Data. Hence the common paperless society
3. Word Processing
Word processor programs e.g. Microsoft word, word star, lotus notes etc
are now on market for use to produce professional looking documents like,
letters, invoices, orders etc.
They have easy to use document edit, format, table tools etc.
4. Business
E-Business and E-commerce facilitate the buying and selling of goods,
services and works on line.
For instance Web sites like: - www. CD-Now for buying music CDs, DVDs &
VCDs, and Interflora.com – for flowers.
IT Laser guided cameras and satellites are now used for national and
domestic security. Business like Banks, supermarkets etc also use IT
Laser guided cameras for customer monitoring in the business hall.
Information technologies are also used in the military to fly and direct
combat planes, locate enemy positions and hit/shell them with minimal
civilian and property losses.
11. Manufacturing:-
In many large manufacturing and production processes robots are being
used to handle tasks, which cannot be efficiently handled by humans.
Mobile Platform
The growth of telecom industry especially in mobile sector has been incredible
over last few years. The service providers upgraded the mobile networks with
next-Generation services like 3G, WAP and GPRS.
The banks are trying to capitalize this growth in the telecom sector and provide
the services to the customers through mobile. The main advantage of mobile
banking over the Internet banking is that it offers ‘Anywhere Anytime Banking’.
Customers can check their accounts, transfer funds, balance statements etc
during travel without the access to a computer. The limitations of Internet
Banking are overcome in mobile banking since it requires only a mobile which
can be accessed by people of developing countries also.
Grid Computing
The basic idea of Grid computing is that the computers are connected as a grid and
the software running in the grid gives more priority to local users, but when they
become idle these computers are used over the grid.
Providing remote access to IT resources
It is easy to predict that the computers and related equipment will get faster in
memory, smaller and cheaper. Computer technology will find new application and
manufacturers will strive to make computing easier and cheaper
Possible future trends in computer capabilities, physical size, price and software.
(b) Physical size. Most hardware components will get smaller and faster. This
means computers will become smaller and do more.
(c) Price. As technology advances, the price of computers will go down. Every
sphere of ife will be permeated by computers, which will be common even
among people of average earning.
(d) Software. Software development will also develop to allow users easily
operate computer systems. To facilitate document, the best programming
and operating systems are moving towards object-oriented system. OS will
play an integral part in giving the user more control over how data are linked
and shared. New operating systems will focus on object linking, message
passing and data sharing.
Areas of application
Finance/Business planning
Teaching field. They compliment teachers knowledge e.g typing
tutor, project planning and monitoring.
Special areas. Act as substitute for retiring human experts.
Banking
(iii) Mobile Robots. Some robots act as transporters e.g mail mobiles
which carry mail to offices following a pre-programmed route.
N.B
SYSTEM ANALYSIS
This is the process of solving computer problems and use of computer technologies to
meet the needs of an organization.
This is the first stage of the system analysis. Here the analysist makes a survey by
gathering information needed for the system and the allocation of the requirements to
the software.
Every organisation has several businesses and systems that function individually and
cohesively to achieve a set of targets.
System analysis is the detailed evaluation of a particular system to identify areas for
improvements and make any enhancements if necessary.
This includes; gathering the company requirements and researching the path to be
taken to effect these requirements. The ultimate target is to have a fully operational
system in place which provides efficiency and reliability to the organisation.
A question which is often asked regarding system Analysis is “What are the benefits of
system analysis?”
Risks. Through the process potential threats are identified. A risk assessment is
carried out to evaluate all the negative impacts on the processes.
Quality. The quality of the systems is ensured through the checking of the
system constantly through system analysis.
Definition: SDLC is stand for System Development Life Cycle. The System
Development Life Cycle is a conceptual model used in project management that
describes the stages involved in an information system development project.
System development life cycle is a model used to describe the level of information
system development projects from beginning until it is completed.
a) Planning
b) Analysis
c) Design
d) Implementation
e) Maintenance.
Planning
planning is the first phase we need to do instead of other phase which is analysis,
design, implementation and maintenance because of planning is the phase to create a
project plan and without the project plan how the company proceed to the next phase.
Besides that, during the planning phase, the objective of the project is determined and
the requirements to produce the product are considered. An estimate of resources,
such as employees and costs, is prepared, along with a concept for the new product.
All of the information is analysed to see if there is an alternative solution to creating a
new product. If there is no other viable alternative, the information is assembled into
a project plan and presented to management for approval.
Besides that, in the analysis stage the project team need to determine the end-user
requirements. Often this is done with the assistance of client focus groups, which
provide an explanation of their needs and what their expectations are for the finished
product and how it will perform. The project team documents all of the user
requirements and gets a sign-off from the client and management to move forward
with system design.
Design this is the third phase of system development life cycle used to decide if the
system will be created in house or out sourced. This design phase come before
implementation phase because in this phase we need to identify how the system will
operate and how it will be used by end users. This design phase also will re-examine
the feasibility study done in the analysis phase.
Besides that, design phase is the “architectural” phase of system design. The flow of
data processing is developed into charts, and the project team determines the most
logical design and structure for data flow and storage.
Maintenance. In this phase the maintenance happens once the system is operational.
It includes implementation of changes that software might experience over a period of
time, or implementation of new requirements after the software is deployed at the
customer location. The maintenance phase also includes handling the outstanding
errors that may exist in the software even after the implementation phase. This phase
also monitors system performance, repairs viruses and requested changes are made.
Information and communications technology (ICT) has created new job tittles such as;
Computer operators.
Computer technicians.
System analysts
Computer programmers
Software engineers
Information system manager
Database administrator
Computer trainer
Website administrator
Computer graphics designer
Network administrators
This section explains some responsibilities of these professionals who are generally
called information technology workers.
Responsibilities
Responsibilities
Other responsibilities
Making sure that all tasks in the IT department are done correctly
and on time in order to support business planning, control and
decision making processes.
Preparing budgets for the department.
Keeping the department inventory records up-to-date.
Managing the human resource with in the department.
Responsibilities
The internet will continue to expand and change in several ways; faster
connections, more users, new multimedia and virtual reality services.
More interactive services such as multimedia newspapers, livestock
market tickers, automatic notification of when pre-destinated events
take place anywhere on the internet.
Internet as universal as a radio and television today.
Learning will become any time anywhere.
Impact of information technology to the society, morally
unemployment vision, laxity and entertainment.