2024
Computer Security is all the activities related to the identifying, assessing and managing vulnerabilities, threats and attacks on a computer system.
Vulnerability
Exposure to the possibility of being harmed or attacked
Threat
A statement of intention to harm
Attack
Actual action that causes damage or harm
Countermeasure
An action taken to counteract a threat
This is any activity during which a computer system or network’s data is accessed, modified or deleted without proper authorization.
Computer misuse includes acts which are likely to cause unauthorized modification, removal or copying of the contents of any computer system, Directly or indirectly obtaining computer service without proper authorization, Accessing programs or data on a computer with the intent to commit a crime or just unauthorized access to a computer system.
Cyberbullying:
Cyberbullying is a form of harassment or bullying in an online space. It can occur through SMS or online gaming platforms. Cyberbullying includes insulting , false, harmful or mean comments or the sharing of embarrassing content.
Identity Theft:
Identity theft is the deliberate use of someone else's identity, usually to gain a financial advantage
Your identity can be stolen to do a number of crimes
including:
False applications for loans and credit cards
Fraudulent withdrawals from bank accounts
Fraudulent use of online accounts
Fraudulently obtaining other goods or services
Phishing Attacks:
Phishing involves attempting to steal sensitive information (like usernames, passwords, or credit card details) through fake emails pretending to be from trusted organizations. Users are usually asked to click on a link and promised a reward.
Violation of Privacy:
Privacy refers to the right of individuals to decide freely under what conditions and to what extent they will disclose personal information about themselves. Governments and organizations that handle personal data, such as names, addresses, birth dates, bank details, and contact numbers, are responsible for maintaining its confidentiality. Violations of privacy occur when any of these rights are breached, including storing inaccurate personal data, sharing information without the individual's consent, or using data for purposes other than those originally intended.
Privacy policies outline how the data that websites collect will be used and what rights the user is giving up when they accept the website’s terms of service
Copyright Infringement & Software Piracy
Copyright infringement occurs when someone other than the rights holder reproduces, distributes, or benefits from the work without permission or paying required fees.
Software piracy is the unauthorized reproduction, distribution or use of software products. Software piracy negatively impacts the legal owners that produce the software because it reduces their revenues. It also harms national and regional economies. A lower number of legitimate software sales results in lost tax revenue.
Data Theft
Data theft is the unauthorized copying or removal of data from the legitimate owner’s computer System.
The Dark Net is the term given to the parts of the Internet that are kept hidden from the general public and cannot be accessed by standard search engines such as Google and Bing.
Denial of Service Attacks (DOS)
A denial of service attacks (DOS attack) is a cyber-attack where the intent is to prevent a service being delivered by the target system.
The attack could be by an individual hacker exploiting a vulnerability in the target system to gain unauthorized access and so crash the system from within.
NB. When the attack is directed from the outside in, it may be a distributed denial of service attack.
Malware
Malware (malicious software) is software designed to disrupt, damage or gain unauthorized access to a computer system.
Malicious programs can be delivered:
Physically
Via the Internet
Via phishing attacks
Electronic Eavesdropping
Electronic eavesdropping is the act of electronically intercepting communications without the knowledge or consent of at least one of the participants. It is used by both law enforcement and criminals.
Propaganda
Propaganda is communication of information that is of a biased or misleading nature and that is aimed at influencing the recipient. The content is usually repeated and dispersed over a wide variety of media
Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs, and data from attack, damage or unauthorized access
Cyberspace: A Cyberspace is any data or resources that are accessed through a network or internet operated space.
Cybercrime: Cybercrime is any crime perpetrated using computers and networks
Physical Measures, Software Measures and Personal Security Practices can be used to mitigate threats
Physical Measures
A physical security measure is any mechanism that reduces the risks of unauthorized access to a computer system’s hardware
Software Measures
Software countermeasures are a combination of specialized system software and application software used to protect computer systems.
Personal Security Practices
Personal security practices are countermeasures used by individuals to implement computer security and cybersecurity.
In Information Technology, a problem is a discrepancy (or difference) between the data we have and the information required.
Solution: A solution is a set of instructions that, if followed in order, will produce the required information.
Problem Solving:The process of creating a set of instructions that, when executed, is solving a problem that was indicated previously.
Pseudocode: Pseudo code is a formal way of writing an algorithm using structured English text, numbers and special characters.
Flowchart: A flowchart is a pictorial way of representing an algorithm using a set of standard symbols (shapes)
Define the problem
Propose and evaluate solution
Determine the best solution
Develop the algorithm
Represent the algorithm as pseudocode or a flowchart
Test and validate the solution
An input-Process-Output (IPO) chart is a helpful diagrammatic way to start breaking down a problem.
The IPO chart stores values: VARIABLES & CONSTANTS
In programming, a variable is a container that stores values capable of changing during processing .
A constant is also a container with a value, but that value cannot be changed during processing.
N.B All variables and constants have an identifier and a data type
Identifiers E.g 5 → (num1) September → (birth month)
Integers: Whole numbers such as 1, 5, -7, etc
Float: Numbers which are not whole (decimals, fractions)
Character: letters, numerical values and special symbols such as @, b, 7 (single)
String: a SEQUENCE of characters (whole words, tele #) eg, boy, (8766)
Boolean: a true or false value (YES/NO)
Before use in a program they must be declared. This allows the computer to allocate the correct amount of memory to hold the values.
An algorithm is a sequence of instructions which rigorously defines a solution to a problem.
All algorithms are:
Unambiguous -not open to more than one interpretation.
FInite -must eventually finish.
Precise - They have instructions that pass the flow of control from one process/action to another.Instructions in an algorithm must be followed in a sequence, control passes from one process to the next until the algorithm terminates
START
DECLARE NUM1, NUM2, sum as INTEGER
PRINT “Please enter the first number”
READ NUM1
PRINT “Please enter the second number”
READ NUM2
sum = NUM1 + NUM2
PRINT “The sum is”, sum
STOP
Relational operators test the relationship between two values in a condition and always result in true or false.
A condition is an expression that includes a relational operator and the two operands on which it
operates.
An operand is a data value, held in a variable that is part of a condition.
These are symbols that represent mathematical computations such as addition, subtraction, multiplication and division.
+ (Addition)
- (Subtraction)
? ( Multiplication)
/ (Division)
DIV: DIV is the integer division operator which discards the fractional part (remainder) of
the results.
For example 5 DIV 2 since the remainder, which is 1, is discarded.
MOD: The integer remainder operator which gives the fractional part (remainder) of the result.
For example 5 MOD 2 produces 1 since this is the remainder.
The performing of actions based on specific situations or conditions
Conditional Branching Statements
The instruction(s) within the IF statement will be executed once the condition is TRUE. If the condition is not met or it is FALSE, the instruction(s) within the IF statement will be ignored.
The first condition is checked. If the first condition is met, the instruction(s) within the statement will be executed. The second condition will be ignored, seeing that the first condition is already TRUE.
If the first condition is false, the second condition is checked. If the second condition is TRUE:
The instruction(s) within the statement will be executed.
Conditional statements within or grouped with other conditional statements. The aim of is to check if multiple events or data is TRUE before executing the instruction(s).
Computer Security is all the activities related to the identifying, assessing and managing vulnerabilities, threats and attacks on a computer system.
Vulnerability
Exposure to the possibility of being harmed or attacked
Threat
A statement of intention to harm
Attack
Actual action that causes damage or harm
Countermeasure
An action taken to counteract a threat
This is any activity during which a computer system or network’s data is accessed, modified or deleted without proper authorization.
Computer misuse includes acts which are likely to cause unauthorized modification, removal or copying of the contents of any computer system, Directly or indirectly obtaining computer service without proper authorization, Accessing programs or data on a computer with the intent to commit a crime or just unauthorized access to a computer system.
Cyberbullying:
Cyberbullying is a form of harassment or bullying in an online space. It can occur through SMS or online gaming platforms. Cyberbullying includes insulting , false, harmful or mean comments or the sharing of embarrassing content.
Identity Theft:
Identity theft is the deliberate use of someone else's identity, usually to gain a financial advantage
Your identity can be stolen to do a number of crimes
including:
False applications for loans and credit cards
Fraudulent withdrawals from bank accounts
Fraudulent use of online accounts
Fraudulently obtaining other goods or services
Phishing Attacks:
Phishing involves attempting to steal sensitive information (like usernames, passwords, or credit card details) through fake emails pretending to be from trusted organizations. Users are usually asked to click on a link and promised a reward.
Violation of Privacy:
Privacy refers to the right of individuals to decide freely under what conditions and to what extent they will disclose personal information about themselves. Governments and organizations that handle personal data, such as names, addresses, birth dates, bank details, and contact numbers, are responsible for maintaining its confidentiality. Violations of privacy occur when any of these rights are breached, including storing inaccurate personal data, sharing information without the individual's consent, or using data for purposes other than those originally intended.
Privacy policies outline how the data that websites collect will be used and what rights the user is giving up when they accept the website’s terms of service
Copyright Infringement & Software Piracy
Copyright infringement occurs when someone other than the rights holder reproduces, distributes, or benefits from the work without permission or paying required fees.
Software piracy is the unauthorized reproduction, distribution or use of software products. Software piracy negatively impacts the legal owners that produce the software because it reduces their revenues. It also harms national and regional economies. A lower number of legitimate software sales results in lost tax revenue.
Data Theft
Data theft is the unauthorized copying or removal of data from the legitimate owner’s computer System.
The Dark Net is the term given to the parts of the Internet that are kept hidden from the general public and cannot be accessed by standard search engines such as Google and Bing.
Denial of Service Attacks (DOS)
A denial of service attacks (DOS attack) is a cyber-attack where the intent is to prevent a service being delivered by the target system.
The attack could be by an individual hacker exploiting a vulnerability in the target system to gain unauthorized access and so crash the system from within.
NB. When the attack is directed from the outside in, it may be a distributed denial of service attack.
Malware
Malware (malicious software) is software designed to disrupt, damage or gain unauthorized access to a computer system.
Malicious programs can be delivered:
Physically
Via the Internet
Via phishing attacks
Electronic Eavesdropping
Electronic eavesdropping is the act of electronically intercepting communications without the knowledge or consent of at least one of the participants. It is used by both law enforcement and criminals.
Propaganda
Propaganda is communication of information that is of a biased or misleading nature and that is aimed at influencing the recipient. The content is usually repeated and dispersed over a wide variety of media
Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs, and data from attack, damage or unauthorized access
Cyberspace: A Cyberspace is any data or resources that are accessed through a network or internet operated space.
Cybercrime: Cybercrime is any crime perpetrated using computers and networks
Physical Measures, Software Measures and Personal Security Practices can be used to mitigate threats
Physical Measures
A physical security measure is any mechanism that reduces the risks of unauthorized access to a computer system’s hardware
Software Measures
Software countermeasures are a combination of specialized system software and application software used to protect computer systems.
Personal Security Practices
Personal security practices are countermeasures used by individuals to implement computer security and cybersecurity.
In Information Technology, a problem is a discrepancy (or difference) between the data we have and the information required.
Solution: A solution is a set of instructions that, if followed in order, will produce the required information.
Problem Solving:The process of creating a set of instructions that, when executed, is solving a problem that was indicated previously.
Pseudocode: Pseudo code is a formal way of writing an algorithm using structured English text, numbers and special characters.
Flowchart: A flowchart is a pictorial way of representing an algorithm using a set of standard symbols (shapes)
Define the problem
Propose and evaluate solution
Determine the best solution
Develop the algorithm
Represent the algorithm as pseudocode or a flowchart
Test and validate the solution
An input-Process-Output (IPO) chart is a helpful diagrammatic way to start breaking down a problem.
The IPO chart stores values: VARIABLES & CONSTANTS
In programming, a variable is a container that stores values capable of changing during processing .
A constant is also a container with a value, but that value cannot be changed during processing.
N.B All variables and constants have an identifier and a data type
Identifiers E.g 5 → (num1) September → (birth month)
Integers: Whole numbers such as 1, 5, -7, etc
Float: Numbers which are not whole (decimals, fractions)
Character: letters, numerical values and special symbols such as @, b, 7 (single)
String: a SEQUENCE of characters (whole words, tele #) eg, boy, (8766)
Boolean: a true or false value (YES/NO)
Before use in a program they must be declared. This allows the computer to allocate the correct amount of memory to hold the values.
An algorithm is a sequence of instructions which rigorously defines a solution to a problem.
All algorithms are:
Unambiguous -not open to more than one interpretation.
FInite -must eventually finish.
Precise - They have instructions that pass the flow of control from one process/action to another.Instructions in an algorithm must be followed in a sequence, control passes from one process to the next until the algorithm terminates
START
DECLARE NUM1, NUM2, sum as INTEGER
PRINT “Please enter the first number”
READ NUM1
PRINT “Please enter the second number”
READ NUM2
sum = NUM1 + NUM2
PRINT “The sum is”, sum
STOP
Relational operators test the relationship between two values in a condition and always result in true or false.
A condition is an expression that includes a relational operator and the two operands on which it
operates.
An operand is a data value, held in a variable that is part of a condition.
These are symbols that represent mathematical computations such as addition, subtraction, multiplication and division.
+ (Addition)
- (Subtraction)
? ( Multiplication)
/ (Division)
DIV: DIV is the integer division operator which discards the fractional part (remainder) of
the results.
For example 5 DIV 2 since the remainder, which is 1, is discarded.
MOD: The integer remainder operator which gives the fractional part (remainder) of the result.
For example 5 MOD 2 produces 1 since this is the remainder.
The performing of actions based on specific situations or conditions
Conditional Branching Statements
The instruction(s) within the IF statement will be executed once the condition is TRUE. If the condition is not met or it is FALSE, the instruction(s) within the IF statement will be ignored.
The first condition is checked. If the first condition is met, the instruction(s) within the statement will be executed. The second condition will be ignored, seeing that the first condition is already TRUE.
If the first condition is false, the second condition is checked. If the second condition is TRUE:
The instruction(s) within the statement will be executed.
Conditional statements within or grouped with other conditional statements. The aim of is to check if multiple events or data is TRUE before executing the instruction(s).