SECURITY AND ETHICS
CONTENT
- Sources of Security Breaches
- Preventive Measures Against Security Breaches
- Legal Issues to be Considered When Using ICT
Sources of Security Breaches
1. Virus: A virus is a malicious piece of software, designed to spread and cause damage to programs and files on computers. Some viruses are merely annoying, displaying useless error messages. Other viruses can destroy your data and prevent your computer from working. Examples of virus are Trojan horse, worm etc.
(i) Trojan horse: This is a program that does not replicate or copy itself, but causes damage by tricking you into opening an infected file.
(ii) Worm: This is a program that copies itself specifically intended to be distributed to other computers, via email or network connections.
(iii) Virus: This is a program that replicates itself and infects another program by inserting or attaching itself, especially on files already present on the computer.
2. Hackers: Hackers are people who break into someone’s personal online account without the permission to do so.
- NEW: Download the entire term's content in MS Word document format (1-year plan only)
- The complete lesson note and evaluation questions for this topic
- The complete lessons for the subject and class (First Term, Second Term & Third Term)
- Media-rich, interactive and gamified content
- End-of-lesson objective questions with detailed explanations to force mastery of content
- Simulated termly preparatory examination questions
- Discussion boards on all lessons and subjects
- Guaranteed learning