You must complete Graphics: Introduction to CorelDRAW to unlock this Lesson.

SECURITY AND ETHICS

CONTENT

  1. Sources of Security Breaches
  2. Preventive Measures Against Security Breaches
  3. Legal Issues to be Considered When Using ICT

 

Sources of Security Breaches

1. Virus: A virus is a malicious piece of software, designed to spread and cause damage to programs and files on computers. Some viruses are merely annoying, displaying useless error messages. Other viruses can destroy your data and prevent your computer from working. Examples of virus are Trojan horse, worm etc.

(i) Trojan horse: This is a program that does not replicate or copy itself, but causes damage by tricking you into opening an infected file.

(ii) Worm: This is a program that copies itself specifically intended to be distributed to other computers, via email or network connections.

(iii) Virus: This is a program that replicates itself and infects another program by inserting or attaching itself, especially on files already present on the computer.

2. Hackers: Hackers are people who break into someone’s personal online account without the permission to do so.

Lesson tags: Computer Science Lesson Notes, Computer Science Objective Questions, SS3 Computer Science, SS3 Computer Science Evaluation Questions, SS3 Computer Science Evaluation Questions Second Term, SS3 Computer Science Objective Questions, SS3 Computer Science Objective Questions Second Term, SS3 Computer Science Second Term
Back to: COMPUTER SCIENCE/ICT – SS3 > Second Term
© [2022] Spidaworks Digital - All rights reserved.
error: Alert: Content is protected !!