1/74
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Computer Vulnerability
A weakness or flaw in one or more computer systems,used to gain access and even damage the data
Types of Vulnerabilities
1.Hardware 2.Software 3.Data Communications
External Vulnerabilities
1.Natural Disasters
2.Power Surges
3.Terrorist Attacks
Internal Vulnerabilities
1.Employee Error
2.No Backup plan
3.lack of anti virus
Security Threat
An attempt to take advantage of a vulnerability in a system
Computer Security
cybersecurity, involves protecting systems, networks, and data from digital attacks, damage, or unauthorized access
Data Security
It is the protection of data against intentional or accidental damage
Hacking
it is the unauthorized access and use of networked or standalone computers systems to steal or damage data and programs
Accidental Damage
It occurs due to genuine errors by computer users
Eg.entering incorrect commands,viruses transmitted via the internet,secondary storage device
Data Communications
IT is the electronic exchange of information between devices via electronic channels
Disadvantage of data communication
All electronic transmissions can be intercepted by person other than the intended receiver
Proprietary Data and Software
The data and software developed and used exclusively by the organisation used by employees for day to day operations.
NB.Org go through great lengths to protect the integrity and security of this data
Computer Fraud
IT is the illegal use of computers, networks, or digital devices to manipulate data, breach systems, or deceive individuals for financial gain.
Ways in which info can be misused
Propaganda,Identity Theft,Espionage,Financial abuse
Progaganda
The use of computer systems to spread information used to promote a particular point of view
identity theft
A crime that involves the use of computerized systems to steal someone identity in order to steal money or obtain benefits
espionage
It is is the act of secretly stealing or gathering confidential information from an enemy, competitor, or government
Ways Identity theft can be prevented
Checking for unusual purchases
Secure websites
not making online purchases with debit card
not using public computers
Financial Abuse
Individuals gain unauthorized access to financial accounts and change details to their advantage
Data Protection
refers to measures taken to protect data from loss, damage or unauthorized access
Surveillance
Computer surveillance involves the use of technology to gather information on the user and from the computer often without the users knowledge
Physical Security
Alarm Systems
Computer Controlled locks
Biometric recognitions
Access codes
Consequences of surveillance
1.Loss of privacy
2.potential misuse of information
Survelliance Techniques
1.Monitoring witth utiliy software
2.Physical devices
Monitoring with Utility software
Packet sniffing is the monitoring of data packets as they travel across a network
Eg. Keyloggers that record keystrokes
Monitoring with Physical devices
Devices called bugs are keystroke loggers implemented in a keyboard.
phising attack
phishing is a digital scam where someone pretends to be someone you trusted via email,sms to trick you into giving up sensetive information
Denial of Service (DoS) Attack
occurs when computer systems or networks are flood with requests by zombie machines until it cannot handle any legitimate requests
electronic eavesdropping
It is the use of electronic devices to monitor communications between two or more groups without permission
Protection From Nature
Data should be protected from natural disasters like fire,storm damage,dust and humidity.
Organisations use fireproof cabinets and safes
Computer systems should make use of surge protectors to protect computer hardware against electricla surges or spikes
The effects of power outages can be minimized with a uninterruptible power supply(UPS)
Uninterruptible power supply(UPS)
An Uninterruptible Power Supply (UPS) is a device that provides instant, short-term battery backup power to connected electronics so they can backup important data when the main power source fails
Protection From Theft
Organisation often lock computers to the desks to prevent theft of the systems.
They limit access to authorised persons and maintain rcords and logs of computer users
Malware
software that is designed to disrupt,damage or gain unauthorized access to a computer system
Computer Virus
A computer virus is a program that infects computer files and make them do something unexpected or damaging
Types of Viruses
File Infector Virus: These common viruses attach themselves to executable files or programs. When the user runs the application, the virus activates and can infect other files on the system.
Boot Sector Virus: These target the boot sector of a hard drive or storage device. They are highly dangerous because they load into memory as soon as the computer starts, allowing them to control the system before anti-virus software loads.
Macro Virus: Written in macro languages for applications like Microsoft Word or Excel, these viruses infect documents and spreadsheets. They automatically execute when the infected file is opened and can destroy or rewrite files, or spread via email attachments.
What is a Worm?
A worm is electronic threat unlike a virus does not need a host and can be transmitted via email and are capable of copying themselves into memory
What is a bot
Controls your computer and communicate with other computers
Trojan
act as legitimate software but has malware in it
Preventing Viruses
Virus protection programs not only scan a computers data for harmful viruses but also protect from and intercepts viruses attempting to infect data
The best way to protect a computer:
1.Install anti virus software -This protects the operating system,programs and files against,viruses.
Eg. Mcaffe,Avast,Avg
2.Firewall-are software programs that check all incoming and outgoing data on a network.It block certain traffic based on set instructions
3.Password-are used to restrict access to unauthorised data or information
4.Never open an email attachment that contains an executable file with an extension EXE,COM or VBS, even if you know who sent the email
Protecting Files and Databases
A database contains the raw data for information.Often the database in an organisation are its life blood.Companies therefore cannot afford to lose records.Maintaing several generations of backups as well as archives of all its critical files are advised.The master and backup files should be stored in fireproof safes or preferably in separate buildings away from the main computer center
Backups and archives(Protecting Files and Database)
Making backups of files is always important for businesses and other organizations that depend on databases. Files can be corrupted or even lost
Most modern networks have software which automatically performs backups of data files to magnetic tape or CD-RW
Remote data backup-Stores backups in cyberspace. Users and companies buy online storage for easy access
Network and cybersecurity
Companies address cyber threats with encryptions or decryption techniques.They encode data before transmission so that it appears unintelligible unless it is decrypted using a software key
Users on a network can each be given username with an individual password.This prevents other users accessing an individual's file,Change settings,Or installing,Copying or deleting software
CopyRight
Copyright is the name given to the protection in law of the rights of the persons responsible for creating such things as text,a piece of music,paintings or computer program
Software Piracy
Software piracy is the unauthorized copying, distribution, or use of copyrighted software, violating intellectual property rights
illegal Activities
1.Planting computer virus
2.copy computer program illegaly
3.hacking into a computer
4.use of computer to commit a crime
5.use of employers computer to do unauthorised work
Social Impact (Effects of It in the Workspace)
-less social contact among employees
-A large increase in the use of games
-easier to keep in touch with people
-privacy consideration-how secure is personal data?
Work Patterns (effect of It in the workspace)
-The internet and WANs have allowed employees to work from home
-Advantage include flexible hours,a more relaxed atmosphere and no commuting
-Disadvantages are a lack of social contact
Cashless Society (effects of it in the workspace)
-Workers are automatically paid by electronic fund transfer into their account
-Credit and debit are used more for payment
-Advantage no need to carry cash
-Disadvantage is the possibility of fraud or lost or stolen cards
Employment (Effect of IT in the workspace)
-Practical skilled jobs on the decline
-Possible redundancies if a more efficient IT based system replaces workers
-New jobs created in IT related fields such as programmers,system analyst,robot maintenance
-Workers need to be retrainned
Health and Safety (Effect of IT in the workspace)
-Attention need to made to posture problems from sittinf for long periods
-Radiation hazzard from monitors and eye strain
-RST(Repetitive starin injury
Changes in the workspace
Information Technology (IT) has caused many changes in the workspace. Tasks that were once done manually are now automated, making work faster and more efficient. IT has also made remote work possible, allowing employees to work from home using the internet. Offices have become more paperless as documents are stored digitally. Communication has improved through emails and video calls, and workers can sometimes have flexible hours. However, while IT has created new jobs, it has also replaced some traditional ones, and employees now need new technical skills to keep up with these changes.
Loss of jobs and retrainning
-Repetitive jobs-telephone operator
-dangerous jobs
office jobs that can be automated or take less time using ict skills
Most jobs now require some ICT skills and so for some people retrainning is necessary to remain in the workforce
Telecommuting
Telecommuting (also called remote work or working from home) is a way of working where employees do their jobs from outside a traditional office, usually using technology like the internet, computers, and phones.
Advantages:
Reducing office space
Saves time and money (no travel)
More flexible schedule
Comfortable work environment
Disadvantages:
Can feel isolated
Harder to separate work and home life
Requires self-discipline
Social Concerns
The widespread use of information systems has led to more efficient ways of working and to a decrease in the hours that many people have to work,this allows more time for people to spend on leisure pursuits,the growth of telecommunication including the internet has led to a situation where people can share information in a "global village".Distance is no longer an issue with people communicating.
Health Concerns
Millions of people use computers regularly for work education and leisure.As with any other equipment computers should be used safely and in a way that doesnt harm users health
Using computers for long periods of time can affect your health and result in injury
Examples:
Repetitive strain injury(RSI)
-Repetitive Strain Injury (RSI) is a condition caused by doing the same movements over and over again, especially when using computers.
What can be done to stop RSI:
-take regular breaks
-place the mouse to the immediate left or right of keyboard
-hold mouse losely
-use wrist or arm rest
-stretch and move your arms,wrist,and neck
-Relax-rsi csn be caused by tension
Back Problems
-Back problems can be caused by poor or incorrect posture when using furniture or equipment
What can be done to stop it:
-use chair that is adjuustable to height
-sit in comfortable position
-take breaks and standup and walk
Eye Problem
Eye strain is the most common health problem linked to using computers screens for long period.Eye problem also linked to poor lighting,glare and being to close to screen.
Stress
Information Technology (IT) can cause stress in the workspace due to constant use of computers, heavy workloads, and the pressure to meet deadlines quickly. Workers may feel overwhelmed by emails, messages, and the need to stay connected all the time. This can lead to tiredness, lack of focus, and reduced productivity. Stress can be reduced by taking regular breaks, managing time properly, and not overusing technology.
Environmental concerns
Information Technology (IT) can cause environmental concerns because it leads to increased electronic waste when old computers and devices are thrown away. These devices can release harmful chemicals into the environment. IT also uses a lot of electricity, which increases energy consumption and contributes to pollution. However, IT can also help reduce environmental damage by promoting paperless offices and reducing the need for travel through online communication.
Legal,ethical and moral effects
The legal,ethical and moral effects of information systems will continue to be an area of concerns to users.A great deal of personal information is held on computers.
The data protection act tries to ensure that personal information is held and processed responsibly.Laws have also been passed to try to stop hacking and piracy of software
Ethical and moral issues:
-How far should the law go to giving government officers such as police access to everyones personal data
-how technology should be used to monitor people activities
-what will happen to people who cant afford computer systems
It skills required in workspace
Information Technology (IT) skills are important in the workspace because many jobs require the use of computers and digital tools
-Basic typing and computer skills
-Using word processing software (e.g., documents)
-Using spreadsheets for calculations and data
-Sending and receiving emails
-Internet research skills
-Using communication tools (video calls, messaging)
-File management (saving, organizing documents)
-Basic knowledge of cybersecurity (protecting data and passwords)
-Using presentation software (slideshows)
-Data entry and database management
-Basic troubleshooting (fixing simple computer problems)
-Using printers, scanners, and other devices
-Accounting and budgeting
-Animations
-Using specialized software
ICT personnel
1.Computer support specialist
2.Computer Programmer
3.system analyst
4.Database Administrator (DBA)
5.Network Administrator
6.Social media specialist
7.software developer
8.System Administrator
9.Web Developer
Computer support specialist
Provides technical assistance directly to computer users who needs assistance with a specific application
Computer Programmer
A Computer Programmer is a professional who writes, tests, and fixes code that tells computers how to perform tasks. They work with existing designs or instructions to create software and make sure it runs correctly.
system analyst
analyses systems currently in place to assess their suitability for computerisation or recommends upgrades for existing computer systems
Database Administrator (DBA)
A Database Administrator (DBA) is a professional who manages and organizes an organization's databases. They ensure that data is stored safely, backed up, and easily accessible when needed. DBAs also control who can access the data, monitor database performance, and fix any issues that arise.
Network Administrator
A Network Administrator is a professional who manages and maintains an organization's computer networks. They set up, monitor, and troubleshoot networks to ensure they run smoothly and securely. Network administrators also control access to the network, protect it from security threats, and upgrade hardware and software when needed.
Network Engineer
Attends to any hardware faults and malfunctions in the equipment, installs new systems and service computers
Social media specialist
Communicates with the public using social media to create and share content using social media platforms such as twitter.Manages their employer's social media accounts, and working to build the brand's reputation
software developer
A Software Developer is a professional who designs, creates, and maintains computer programs and applications. They write code, test software, fix bugs, and update programs to meet users' needs.
System Administrator
Monitors and maintains the system security,and determines what the organisation system needs and adds users to a network and assigns and updates security permissions on the network
Web Developer
Builds websites, which involves writing the programming code necessary for an efficient and stable website.
Web developer oversee and direct the development of the website from idea stage to its final published state,ensuring that loading times are minimised so that users can access info quickly
advantages of computerized info systems
-Save money on paper and filling space
-Rapidly find calculate and sort data
-work automatically
-data easily imported from another system or program
-data easily entered or updated
-easier ways to collaborate on information at the same time
Disadvantages of computerized info systems
-Some systems can be complicated and require a lot of time to be spent on staff training
-The computer running the information system may not work due to an electrical failure or hardware/software fault.
-Data may be incorrect
-Some people may try to access confidential information
When choosing a computer system u need to consider:
1.What hardware is used
2.What software is used
3.What processing takes place
4.What human-computer interface is used
5.Which people are involved and what work they do
6.What data is required
CAI
Computer aided instructions
CAL
Computer aided learning
Expert system
An expert system is an artificial intelligence program that emulates the decision-making skills of a human expert to solve complex, domain-specific problems