Teach Any Computer Science Class
We have put together a full GCSE Computer Science curriculum that will give you all the teaching materials you need to teach any topic.
Whether you're a brand new Computer Science teacher, or you've been teaching ICT for years, our resources will save you hours and hours of lesson preparation every single week.View the Lessons →
Computer Security is the preservation of computing systems and the information that they save or retrieve.
Computer Security is important as it enables people to perform their work and study. It helps in the execution of essential business processes. It safeguards confidential and sensitive information.
Computer Security should be learned by everyone. Only 10% of security safeguards are technical while 90% depends on the user adhering to good computing practices.
Every user of a computer or mobile device has to grasp how to keep their computer, device, and data secure. Computer security is everyone’s responsibility.
Core Principles of Cyber Security
- Confidentiality – Information that is sensitive or confidential must remain so and should be accessible to authorized users only.
- Integrity – Information must remain its integrity and not be altered from its original state.
- Availability – Information and systems must always be available to authorized users when needed.
Importance of Computer Security in Organizations Today
- To preserve company assets – Company assets include information kept in the computer networks, which are as vital and useful as the physical assets of the company.
- To conform with governing requirements and moral responsibilities – Each organization creates policies and procedures that deal with the security requirements of the organization.
- For competitive benefit –Financial services and e-commerce consider network security of prime importance.
- To help curb the increasing volume and sophistication of cyber security threats – including targeting phishing scams, data theft, and other vulnerabilities.
The internet can be a dangerous place where thousands of attacks per minute infiltrate a network. An unprotected computer can become impacted or damaged within a few seconds after being connected to the network.
A weakened computer is a threat to everyone else. A hacked computer can be used to do the following:
- Record keystrokes and steal passwords
- Send spam and phishing emails
- Harvest and sell email addresses and passwords
- Access restricted or personal information on your computer or other systems that you have access to
- Infect other systems
- Hide programs that launch attacks on other computers
- Illegally distribute music, movies, and software
- Distribute child pornography
- Produce great volumes of traffic, slowing down the whole system
A weakened computer can be utilised for all types of shocking things.
Many internet security hazards can be prevented. Here are some ways to prevent security hazards:
- Use strong, ambiguous passwords that can’t be easily predicted – and keep them secret.
- Ensure that your computer, devices and applications are updated.
- Ensure that your computer is secured with updated antivirus and anti-spyware software.
- Ignore unknown or unsolicited links or attachments. Don’t download unfamiliar files or programs onto your computer or other devices.
- Remember that data, especially passwords transmitted through typical wireless are very easy for hackers to capture.
- Look for https in the URL before you input any confidential information or a password. The added s in http means secure.
- Also avoid using normal, unencrypted e-mail and unencrypted Instant Messaging if you’re concerned about confidentiality.
Consequences for Security Violations
- Risk to security and integrity of personal or confidential information
- Identity theft
- Data corruption or destruction
- Unavailability of critical information in an emergency
- Loss of valuable business information
- Loss of employee and public trust, embarrassment, bad publicity, media coverage and news reports
- Costly reporting requirements in the case of a compromise of certain types of personal, financial and health information
- Internal disciplinary action(s) up to and including termination of employment, as well as possible penalties, prosecution and the potential for sanctions / lawsuits
Computer security is the protection of computers and data that the computers hold. Computer security can be anything from placing passwords on computers to setting up firewalls.