NAME: NYAKUDYA ANOTIDAISHE CANDIDATE NUMBER:
CENTER NUMBER:
CALA COMPONENT A
LEARNING AREA: COMPUTER SCIENCE
LEVEL: U6
CALA TYPE:
SYLLABUS TOPIC: SECURITY AND ETHICS
SUB-TOPIC: COMMON THREATS TO COMPUTER SYSTEMS AND PROTECTION
. MEASURES
CALA TITLE: THREATS AFFECTING COMPUTER SYSTEMS AND WAYS OF PROTECTING
. COMPUTER SYSTEMS
BACKGROUND:
Several factors have contributed to loss of data and computer hardware in many schools. Poor
security measures have been put in place leading to loss of Data and Hardware.
PART A
This research is gathered from SINOIA PRIMARY SCHOOL.
The institution Background:
Marondera High School was started in the 1960s, so as to educate the people of Zimbabwe. The school
has been developing from time to time according to the new technology which is being introduced in
the country. One of the major development was introduction of a computer system for several
purposes, but there have been cases of data and hardware being lost.
Research Instruments used to gather more information on the introduced computer system:
1. Interview
2. Observation
3. Record inspection
4. Questionnaire
On loss of the Hardware
1. Interview
I interviewed the Head of the Computer Department (Mr Darangwa) at this institution, and the
following was asked and replied:
How many computers did you have at first and the ones you have functioning right now?
He replied that they started with 100 full computer sets but now they are 42 left.
What made this drastic fall occur?
He replied that this loss was due to; Theft and Vandalism
2. Observation
I visited the institution every day for a month so as to observe the number of functioning
computers, I managed to acquire the following information and made my own conclusion:
For the first 10 days, all of the 42 still working computers were properly functioning but on day
11, five of them stopped functioning. This was due the rain which went in the computer lab
through the windows and got the five computers wet causing a short circuit and frying the
hardware. On day 25 three keyboards and a mouse went missing from nowhere. For the month I
was observing the school computer lab 8 computers where no longer fully functional, some
even dead. From this I concluded that some of the hardware loss is due to poor protection and
housing of the computers, since some were damaged by bad weather and some hardware
components were most probably stolen by the students which come into the lab at any time.
The threats which resulted in hardware loss:
Theft - According to the research I conducted I noticed that some of the school students
are stealing hardware components such as keyboards and mouse, thereby making the
school lose its hardware.
Vandalism - Some students damage the hardware both by mistake and on purpose.
Weather – Due to the bad computer lab infrastructure the computers are affected by
some of the weather elements like rain, lightning and sunlight which destroys the
computer Hardware.
On loss of the data
3. Record Inspection
For the month I was visiting the institution I also conducted a record inspection on the data
which the computer hold. As I was inspecting the computers I noticed that some of the data
went missing due to various causes. Some of the causes included:
Virus attacks
Hackers
4. Questionnaire
I handed some questionnaire to the students and teachers, which had the following questions:
i. Do you ever notice data loss in your computers?
ii. What do you think might be the cause?
Most of their answers agreed giving a conclusion that, yes there’s data loss in the system and it
is being caused by the following:
Some students are deleting important files
The computer system is now out of date, some of the computers are crashing leading to
data loss.
Power outages
The threats which resulted in data loss:
Viruses and Malware – Students are downloading and putting infected files from dark
websites which contain viruses. The viruses are replicating and infecting the
computers causing unexplainable and frequent loss, distortion and corruption of data.
Hackers – Due to the advancement of technology most students are now capable of
teaching their selves to get access to unauthorized files, and then delete or temper with
it causing data loss.
Human error – Students accidentally format the hard drive by maybe misunderstanding
system prompts or error messages, causing loss of data instantly.
Power Outages – Shutting software systems down without warning, not only can this
result in the loss of unsaved data, but it can also cause existing files to be corrupted and
lost due to improper shutdown procedures.
PART B
Ways of protecting data against the threats mentioned in Part A.
Against Viruses and Malware:
1. Installing an antivirus – There are many antivirus programs available. Installing the best
antivirus is no easy task, so it is safer to download more than one if they cover different
security aspects. Antiviruses will protect the computer from viruses.
2. Keeping the computers up to date – All computer operating systems receive frequent
updates that enhance individual features. These updates also include security measures that
keep computers safe from the latest batch of viruses and malware.
3. Run a Virus Scan more often – A virus run scan must be run at least once or twice a week to
prevent or minimize the damage done by malicious coding. This should also be done before
backing up to ensure no harmful files are kept.
Against Hackers:
1. Use of a firewall –. Firewalls prevent unauthorized access to a computer network and alert
you to any intrusion attempts. So the school should make sure the firewall is always enabled
before anyone use the computers to go online.
2. Installing an anti-spyware package – Anti-spyware packages provide real-time protection by
scanning all incoming information and blocking threats.
3. Use of complex passwords – Using passwords is the most important way to prevent network
intrusions. The more secure the passwords are, the harder it is for a hacker to invade the
computer system.
4. Use of encryption – Even if cybercriminals (hackers) gain access to your network and files,
encryption can prevent them from accessing any of encrypted information.
Against Human Error:
1. Back up the computers – Backing up the data on an external hard drive or using backup
utilities built in the computers helps recover lost data when it is accidentally deleted.
Power Outages:
1. Installing the solar power system which will work as an immediate backup when the
electricity goes off, so that the computers won’t improperly shut down.
Ways to protect hardware against threats mentioned in Part A.
Against Vandalism:
1. Installing CCTV (Closed Circuit Television) Cameras – Through looking at the Recordings, the
student who would have vandalized the school property (computers) can be recognized and
be penalized. They are the ones who will repair or replace the hardware.
2. Educating Students on how to use computers properly and not damage them.
Against Theft:
1. Employing security guards who will look after and protect the computer lab.
2. Installing alarms which will alert the guards and teachers will anyone tries to steal the
computer hardware.
Against bad weather:
1. Renovating – Rebuilding some parts of the computer lab building, so as to ensure protection
of the computer hardware from bad weather like heavy rain, hot sun etc.
REPORT.
I found that the computer system which I was investigating is being damaged both its hardware
and software by many things for example, some of the users (the students), bad weather,
hackers, etc. But all these factors leading to its damages can be removed and the computer
system reinstalled and even made better, by installing better operating systems and improving
the computer lab conditions.