Chapter 11 G10 Computer Security Computer Studies
Chapter 11 G10 Computer Security Computer Studies
SECURITY
COMPUTER SECURITY
Prepared By Engineer Mulimbi
Bricious
Email: [email protected]
Email: [email protected]
COMPUTER
SECURITY
SECURITY POLICIES AND TERMINOLOGY
Saving files in the wrong place and then not being able to
remember where they are.
HUMAN ERROR
CONT’
The programmer
has made a Processes to check
mistake, causing that data entered is
the program to correct.
make logical errors.
HUMAN ERROR
CONT’
Preventing human error
Data validation
• A policy that formally describes how the organisation deals with security issues.
Corrupted file
• A damaged, unreadable file.
Network server
• A powerful computer that runs the software that controls the network.
POWER FAILURES
Uninterruptable power
supply (UPS)
This is especially
If someone was working on problematic on a computer
When a file corrupts on a
a large file or database network because more than
computer system the
containing lots of data one device may be
contents may become
when the power failed, this accessing data on network
unreadable.
could cause big problems. server when the power
fails.
PROTECTION
AGAINST POWER
FAILURES
The physical computer hardware such as the workstations, servers and
network switches also has to be protected against power failures, not only
the data.
When there is a power failure and the power comes back on, there are
often power surges that can damage computers and other electronic
equipment.
A UPS can supply battery power to devices for a short while so that files
can be saved and computers and servers shut down properly to prevent the
corruption of files.
PROTECTION AGAINST
POWER FAILURES
CONT’
A UPS also serves another purpose. It is able to smooth out
the power supply and protect devices against power surges
that could blow sensitive electronic components.
Computer viruses
• A computer virus is small computer program that
Any computer has been deliberately written to cause damage to
program that is computer files and data.
unwanted and that • They are executable programs that attach
has installed on a themselves to a program or file, and are then
spread from computer to computer infecting
computer without more and more files over time. They are
the permission of installed without the user's permission or
the user, usually to knowledge.
perform a non- • Computer viruses cause differing amounts of
beneficial activity. damage from relatively innocent things like
annoying messages appearing on the computer
screen to complete corruption of data that makes
it unusable.
COMPUTER WORMS
The ancient Greeks built a huge wooden horse and hid soldiers inside it.
The Greeks left and the Trojans pulled the horse into their city as a victory trophy. That night
the Greeks hidden in the horse opened the gates of Troy for the Greek army.
A Trojan horse appears to be useful software, but once installed on a computer the program
does damage to the system.
A Trojan might simply cause changes to the computer desktop or it can cause more serious
damage to programs and data.
It is also often used to compromise the security of the computer allowing unauthorised access
to the computer or the whole system. Unlike viruses and worms, Trojans do not duplicate
themselves.
SPYWARE
Adware
• Adware is software that displays advertisements on your
computer. Sometimes this is done with the user's knowledge.
• This kind of software is usually relatively harmless, but
advertisements popping up all the time can be very annoying.
Sometimes the advertisements are pornographic in nature.
PROTECTING A COMPUTER
SYSTEM AGAINST MALWARE
The
organisation
should have an
Ensure that the acceptable use
Modern anti-
system is Anti-virus policy that
virus packages
protected by software clearly states
include anti-
good anti-virus detects and what an
spyware and
software that is removes any employee may
anti-adware
updated on a malware. or may not do
modules.
regular basis. in terms of
Internet access
and installation
of software.
PROTECTING A COMPUTER
SYSTEM AGAINST MALWARE
CONT’
The employee's
All users need to be responsibility to
educated about
protect passwords
password security
and the correct should be written
choice of passwords. into the acceptable
use policy.
MEASURES TO PREVENT
UNAUTHORISED ACCESS
CONT’
Large companies
Today a great deal
They monitor all with important
Once they know of business is
network activity data on their
where the weak done over the
and the system systems may
points are, they Internet, so web
for attempts at even employ a
can set about designers skilled
intrusion from hacker to test for
fixing the security in creating secure
outside the weak points in
problem. websites are in
network. their system
demand.
security.
SECURITY
PROFESSIONALS CONT’
There are also companies who are paid make sure
that websites are secure for financial transactions
and to provide the encryption technologies
necessary for secure online transactions.
Thank You