knowt logo

2024

What is Computer Security? 

Computer Security is all the activities related to the identifying, assessing and managing vulnerabilities, threats and attacks on a computer system. 

Elements of Computer Security 

  1. Vulnerability

Exposure to the possibility of being harmed or attacked 

  1. Threat

A statement of intention to harm 

  1. Attack

Actual action that causes damage or harm

  1. Countermeasure

An action taken to counteract a threat 

What is Computer Misuse?

This is any activity during which a computer system or network’s data  is accessed,  modified or deleted without proper authorization.

Computer misuse includes acts which are likely to cause unauthorized modification, removal or copying of the contents of any computer system, Directly or indirectly obtaining computer service without proper authorization, Accessing programs or data on a computer with the intent to commit a crime or just unauthorized access to a computer system.

Computer Misuse Affecting Individuals 

  1. Cyberbullying:

Cyberbullying is a form of harassment or bullying in an online space.  It can occur through SMS or online gaming platforms. Cyberbullying includes insulting , false, harmful or mean comments or the sharing of embarrassing content. 

  1. Identity Theft: 

Identity theft is the deliberate use of someone else's identity, usually to gain a financial advantage

Your identity can be stolen to do a number of crimes

including:

  • False applications for loans and credit cards

  • Fraudulent withdrawals from bank accounts

  • Fraudulent use of online accounts

  • Fraudulently obtaining other goods or services

  1. Phishing Attacks:

Phishing involves attempting to steal sensitive information (like usernames, passwords, or credit card details) through fake emails pretending to be from trusted organizations. Users are usually asked to click on a link and promised  a reward. 

  1. Violation of Privacy: 

Privacy refers to the right of individuals to decide freely under what conditions and to what extent they will disclose personal information about themselves. Governments and organizations that handle personal data, such as names, addresses, birth dates, bank details, and contact numbers, are responsible for maintaining its confidentiality. Violations of privacy occur when any of these rights are breached, including storing inaccurate personal data, sharing information without the individual's consent, or using data for purposes other than those originally intended.

Privacy policies outline how the data that websites collect will be used and what rights the  user is giving up when they accept the website’s terms of service

Computer Misuse Affecting Organisations

  1. Copyright Infringement  & Software Piracy 

Copyright infringement occurs when someone other than the rights holder reproduces, distributes, or benefits from the work without permission or paying required fees.

Software piracy is the unauthorized reproduction, distribution or use of software products. Software piracy negatively impacts the legal owners that produce the software because it reduces their revenues. It also harms national and regional economies. A lower number of legitimate software sales results in lost tax revenue.

  1. Data Theft 

Data theft is the unauthorized copying or removal of data from the legitimate owner’s computer System.

The Dark Net  is the term given to the parts of the Internet that are kept hidden from the general public and cannot be accessed by standard search engines such as Google and Bing.

  1. Denial of Service Attacks (DOS) 

 A denial of service attacks (DOS attack) is a cyber-attack where the intent is to prevent a service being delivered by the target system.

The attack could be by an individual hacker exploiting a vulnerability in the target system to gain unauthorized access and so crash the system from within.

NB. When the attack is directed from the outside in, it may be a distributed denial of service attack.

  1. Malware

Malware (malicious software) is software designed to disrupt, damage or gain unauthorized access to a computer system.

Malicious programs can be delivered:

  • Physically

  • Via the Internet 

  • Via phishing attacks

Computer Misuse Affecting Governments 

  1. Electronic Eavesdropping 

Electronic eavesdropping is the act of electronically intercepting communications without the knowledge or consent of at least one of the participants. It is used by both law enforcement and criminals. 

  1. Propaganda 

Propaganda is communication of information that is of a biased or misleading nature and that is aimed at influencing the recipient. The content is usually repeated and dispersed over a wide variety of media

What is Cybersecurity?

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs, and data from attack, damage or unauthorized access

Cyberspace:  A Cyberspace is any data or resources that are accessed through a network or internet operated space. 

Cybercrime:  Cybercrime is any crime perpetrated using computers and networks

Countermeasures To Mitigate Threats

Physical Measures, Software Measures and Personal Security Practices can be used to mitigate threats

Physical Measures

A physical security measure is any mechanism that reduces the risks of unauthorized  access to a computer system’s hardware

Software Measures

Software countermeasures are a combination of specialized system software and application software used to protect computer systems.

Personal Security Practices

Personal security practices are countermeasures used by individuals to implement computer security and cybersecurity.

Problem Solving 

In Information Technology, a problem is a discrepancy (or difference) between the data we have and the information required. 

Problem Solving Terms 

Solution:  A solution is a set of instructions that, if followed in order, will produce the required information.

Problem Solving:The process of creating a set of instructions that, when executed, is solving a problem that was indicated previously.

Pseudocode: Pseudo code is a formal way of writing an algorithm using structured English text, numbers and special characters.

Flowchart: A flowchart is a pictorial way of representing an algorithm using a set of standard symbols (shapes)

Steps in Problem Solving 

  1. Define the problem

  2. Propose and evaluate solution

  3. Determine the best solution

  4. Develop the algorithm

  5. Represent the algorithm as pseudocode or a flowchart

  6. Test and validate the solution

 IPO Charts

An input-Process-Output (IPO) chart is a helpful diagrammatic way to start breaking down a problem. 

Variables & Constants 

The IPO chart stores values: VARIABLES & CONSTANTS

In programming, a variable is a container that stores values capable of changing during processing .

A constant is also a container with a value, but that value cannot be changed during processing.

N.B  All variables and constants have an identifier and a data type 

Identifiers E.g  5 → (num1)  September → (birth month)

Data Types 

  • Integers: Whole numbers such as 1, 5, -7, etc 

  • Float: Numbers which are not whole (decimals, fractions)

  • Character: letters,  numerical values and special symbols such as @, b, 7 (single)

  • String: a SEQUENCE of characters (whole words, tele #) eg, boy, (8766)

  • Boolean: a true or false value (YES/NO)

Before use in a program they must be declared. This allows the computer to allocate the correct amount of memory to hold the values.

 Algorithms 

An algorithm is a sequence of instructions which rigorously defines a solution to a problem.

All algorithms are:

  1. Unambiguous -not open to more than one interpretation.

  2. FInite -must eventually finish.

  3. Precise - They have instructions that pass the flow of control from one process/action to another.Instructions in an algorithm must be followed in a sequence, control passes from one process to the next until the algorithm terminates

EXAMPLE OF A SIMPLE ALGORITHM 

START 

DECLARE NUM1, NUM2,  sum as INTEGER

PRINT “Please enter the first number” 

READ NUM1

PRINT “Please enter the second number” 

READ NUM2

sum = NUM1 + NUM2

PRINT “The sum is”, sum 

STOP 

Relational Operators 

Relational operators test the relationship between two values in a condition and always result in true or false.

A condition is an expression that includes a relational operator and the two operands on which it

operates.

An operand is a data value, held in a variable that is part of a condition.

Arithmetic Operators 

These are symbols that represent mathematical computations such as addition, subtraction, multiplication and division.

  • + (Addition)

  • - (Subtraction)  

  • ? ( Multiplication) 

  •   / (Division) 

SPECIAL ARITHMETIC OPERATORS:  

DIV: DIV is the integer division operator which discards the fractional part (remainder) of

the results.

For example 5 DIV 2 since the remainder, which is 1, is discarded.

MOD:    The integer remainder operator which gives the fractional part (remainder) of the result.

For example 5 MOD 2 produces 1 since this is the remainder.

Conditional Branching

The performing of actions based on specific situations or conditions 

Conditional Branching Statements 

IF-THEN  

The instruction(s) within the IF statement will be executed once the condition is TRUE. If the condition is not met or it is FALSE, the instruction(s) within the IF statement will be ignored.

IF-THEN -ELSE

The  first condition is checked.  If the first condition is met, the instruction(s) within the statement will be executed. The second condition will be ignored, seeing that the first condition is already TRUE.

If the first condition is false, the second condition is checked. If the second condition is TRUE:

The instruction(s) within the statement will be executed.

NESTED CONDITIONS 

Conditional statements within or grouped with other conditional statements. The aim of is to check if multiple events or data is TRUE before executing the instruction(s).

C

2024

What is Computer Security? 

Computer Security is all the activities related to the identifying, assessing and managing vulnerabilities, threats and attacks on a computer system. 

Elements of Computer Security 

  1. Vulnerability

Exposure to the possibility of being harmed or attacked 

  1. Threat

A statement of intention to harm 

  1. Attack

Actual action that causes damage or harm

  1. Countermeasure

An action taken to counteract a threat 

What is Computer Misuse?

This is any activity during which a computer system or network’s data  is accessed,  modified or deleted without proper authorization.

Computer misuse includes acts which are likely to cause unauthorized modification, removal or copying of the contents of any computer system, Directly or indirectly obtaining computer service without proper authorization, Accessing programs or data on a computer with the intent to commit a crime or just unauthorized access to a computer system.

Computer Misuse Affecting Individuals 

  1. Cyberbullying:

Cyberbullying is a form of harassment or bullying in an online space.  It can occur through SMS or online gaming platforms. Cyberbullying includes insulting , false, harmful or mean comments or the sharing of embarrassing content. 

  1. Identity Theft: 

Identity theft is the deliberate use of someone else's identity, usually to gain a financial advantage

Your identity can be stolen to do a number of crimes

including:

  • False applications for loans and credit cards

  • Fraudulent withdrawals from bank accounts

  • Fraudulent use of online accounts

  • Fraudulently obtaining other goods or services

  1. Phishing Attacks:

Phishing involves attempting to steal sensitive information (like usernames, passwords, or credit card details) through fake emails pretending to be from trusted organizations. Users are usually asked to click on a link and promised  a reward. 

  1. Violation of Privacy: 

Privacy refers to the right of individuals to decide freely under what conditions and to what extent they will disclose personal information about themselves. Governments and organizations that handle personal data, such as names, addresses, birth dates, bank details, and contact numbers, are responsible for maintaining its confidentiality. Violations of privacy occur when any of these rights are breached, including storing inaccurate personal data, sharing information without the individual's consent, or using data for purposes other than those originally intended.

Privacy policies outline how the data that websites collect will be used and what rights the  user is giving up when they accept the website’s terms of service

Computer Misuse Affecting Organisations

  1. Copyright Infringement  & Software Piracy 

Copyright infringement occurs when someone other than the rights holder reproduces, distributes, or benefits from the work without permission or paying required fees.

Software piracy is the unauthorized reproduction, distribution or use of software products. Software piracy negatively impacts the legal owners that produce the software because it reduces their revenues. It also harms national and regional economies. A lower number of legitimate software sales results in lost tax revenue.

  1. Data Theft 

Data theft is the unauthorized copying or removal of data from the legitimate owner’s computer System.

The Dark Net  is the term given to the parts of the Internet that are kept hidden from the general public and cannot be accessed by standard search engines such as Google and Bing.

  1. Denial of Service Attacks (DOS) 

 A denial of service attacks (DOS attack) is a cyber-attack where the intent is to prevent a service being delivered by the target system.

The attack could be by an individual hacker exploiting a vulnerability in the target system to gain unauthorized access and so crash the system from within.

NB. When the attack is directed from the outside in, it may be a distributed denial of service attack.

  1. Malware

Malware (malicious software) is software designed to disrupt, damage or gain unauthorized access to a computer system.

Malicious programs can be delivered:

  • Physically

  • Via the Internet 

  • Via phishing attacks

Computer Misuse Affecting Governments 

  1. Electronic Eavesdropping 

Electronic eavesdropping is the act of electronically intercepting communications without the knowledge or consent of at least one of the participants. It is used by both law enforcement and criminals. 

  1. Propaganda 

Propaganda is communication of information that is of a biased or misleading nature and that is aimed at influencing the recipient. The content is usually repeated and dispersed over a wide variety of media

What is Cybersecurity?

Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs, and data from attack, damage or unauthorized access

Cyberspace:  A Cyberspace is any data or resources that are accessed through a network or internet operated space. 

Cybercrime:  Cybercrime is any crime perpetrated using computers and networks

Countermeasures To Mitigate Threats

Physical Measures, Software Measures and Personal Security Practices can be used to mitigate threats

Physical Measures

A physical security measure is any mechanism that reduces the risks of unauthorized  access to a computer system’s hardware

Software Measures

Software countermeasures are a combination of specialized system software and application software used to protect computer systems.

Personal Security Practices

Personal security practices are countermeasures used by individuals to implement computer security and cybersecurity.

Problem Solving 

In Information Technology, a problem is a discrepancy (or difference) between the data we have and the information required. 

Problem Solving Terms 

Solution:  A solution is a set of instructions that, if followed in order, will produce the required information.

Problem Solving:The process of creating a set of instructions that, when executed, is solving a problem that was indicated previously.

Pseudocode: Pseudo code is a formal way of writing an algorithm using structured English text, numbers and special characters.

Flowchart: A flowchart is a pictorial way of representing an algorithm using a set of standard symbols (shapes)

Steps in Problem Solving 

  1. Define the problem

  2. Propose and evaluate solution

  3. Determine the best solution

  4. Develop the algorithm

  5. Represent the algorithm as pseudocode or a flowchart

  6. Test and validate the solution

 IPO Charts

An input-Process-Output (IPO) chart is a helpful diagrammatic way to start breaking down a problem. 

Variables & Constants 

The IPO chart stores values: VARIABLES & CONSTANTS

In programming, a variable is a container that stores values capable of changing during processing .

A constant is also a container with a value, but that value cannot be changed during processing.

N.B  All variables and constants have an identifier and a data type 

Identifiers E.g  5 → (num1)  September → (birth month)

Data Types 

  • Integers: Whole numbers such as 1, 5, -7, etc 

  • Float: Numbers which are not whole (decimals, fractions)

  • Character: letters,  numerical values and special symbols such as @, b, 7 (single)

  • String: a SEQUENCE of characters (whole words, tele #) eg, boy, (8766)

  • Boolean: a true or false value (YES/NO)

Before use in a program they must be declared. This allows the computer to allocate the correct amount of memory to hold the values.

 Algorithms 

An algorithm is a sequence of instructions which rigorously defines a solution to a problem.

All algorithms are:

  1. Unambiguous -not open to more than one interpretation.

  2. FInite -must eventually finish.

  3. Precise - They have instructions that pass the flow of control from one process/action to another.Instructions in an algorithm must be followed in a sequence, control passes from one process to the next until the algorithm terminates

EXAMPLE OF A SIMPLE ALGORITHM 

START 

DECLARE NUM1, NUM2,  sum as INTEGER

PRINT “Please enter the first number” 

READ NUM1

PRINT “Please enter the second number” 

READ NUM2

sum = NUM1 + NUM2

PRINT “The sum is”, sum 

STOP 

Relational Operators 

Relational operators test the relationship between two values in a condition and always result in true or false.

A condition is an expression that includes a relational operator and the two operands on which it

operates.

An operand is a data value, held in a variable that is part of a condition.

Arithmetic Operators 

These are symbols that represent mathematical computations such as addition, subtraction, multiplication and division.

  • + (Addition)

  • - (Subtraction)  

  • ? ( Multiplication) 

  •   / (Division) 

SPECIAL ARITHMETIC OPERATORS:  

DIV: DIV is the integer division operator which discards the fractional part (remainder) of

the results.

For example 5 DIV 2 since the remainder, which is 1, is discarded.

MOD:    The integer remainder operator which gives the fractional part (remainder) of the result.

For example 5 MOD 2 produces 1 since this is the remainder.

Conditional Branching

The performing of actions based on specific situations or conditions 

Conditional Branching Statements 

IF-THEN  

The instruction(s) within the IF statement will be executed once the condition is TRUE. If the condition is not met or it is FALSE, the instruction(s) within the IF statement will be ignored.

IF-THEN -ELSE

The  first condition is checked.  If the first condition is met, the instruction(s) within the statement will be executed. The second condition will be ignored, seeing that the first condition is already TRUE.

If the first condition is false, the second condition is checked. If the second condition is TRUE:

The instruction(s) within the statement will be executed.

NESTED CONDITIONS 

Conditional statements within or grouped with other conditional statements. The aim of is to check if multiple events or data is TRUE before executing the instruction(s).

robot