0% found this document useful (0 votes)
19 views11 pages

Stuff

Bruh

Uploaded by

blueprintjay98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views11 pages

Stuff

Bruh

Uploaded by

blueprintjay98
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

MUPONDI MIRIRAI

CALA COMPONENT A

CANDIDATE NAME MUPONDI MIRIRAI

LEARNNG AREA COMPUTER SCIENCE

LEVEL FORM 6

CALA TYPE PRACTICAL

SYLLABUS TOPIC SECURITY AND ETHICS SYLLABUS PG 12

SUB TOPIC COMMON THREATS AND VULNERABLITIES

CALA TITLE THREATS AND VULNERABILITIES

COMPETENCIES/SKILLS:
Research, Creation, Problem solving

BACKGROUND
We are all continuously at risk from security threats to systems we use ourselves and to all of
the systems used by organizations upon which we rely. The dominant factor is that none of
these systems are stand-alone; all are connected to networks and through these networks to
the Internet. Using your school as a case study you are required to perform the following
activities.

CALA DESCRIPTION

YOU WILL BE ASSESSED IN THE FOLLOWING AREAS.

Part A
 Analyze common threats and vulnerabilities on computer systems at your school. [15]

Part B
 Suggest major counter measures to the common threats and vulnerabilities. [10]

Cala tip
MUPONDI MIRIRAI

Where possible take pictures and screenshots to show the threats as we as on suggested solutions.

1.Identify threats to data and computers at your school [10]

2.Suggests preventative measures to the identified problems [15]

IDENTIFY THREAT TO DATA AND COMPUTER SYSTEMS AT YOUR SCHOOL

Threats

Definition

A threat is an event with the potential to cause harm to data and computer systems. A threat
may happen or may not happen but has the potential to cause harm. Examples include fire,
viruses, and hackers among other threats.

THREATS AT WADDILOVE HIGH SCHOOL

 Virus

. A virus is a piece of software that can replicate itself and affect a computer without the
permission of the user and can only spread when it attaches itself to another program. Learners
may use flash drives to transfer information between their computer which leads to the wide
spread of viruses in the school laboratory computers.

Viruses can cause a computer to display abnormal applications or enables installation of


unknown applications. Moreover, they force stop some functions, replicate and causes slow
booting and processing of computers.

 Hardware theft and vandalism

Hardware theft is an act of stealing computer equipment and hardware vandalism is an act of
destroying computer equipment physically. Some students enter the laboratory with the aim of
stealing hardware such as mouses. Some steal mice to use on their laptops at home school
desktops. More over some has extended to steal power packs and wires and others practise
their architecture on school desktops.
MUPONDI MIRIRAI
MUPONDI MIRIRAI

 Software theft

Software theft is whereby someone steals software media, intentionally erases programs,
illegally registers and activates a program. This usually happens to candidates who prepare
their projects, as a way of fixing each other one can just enter the person’s account and delete
the whole project towards submission of projects so that even if that person is willing to repeat
there will be no time.
MUPONDI MIRIRAI

 Fire

Students’ plug-in too much cables on one plug which cause electricity to spark and burn the
nearby obstacles causing large flames which will destroy the laboratory. Electric cables for the
desktop, monitor and everything connected are under the desk where students put their legs
and if a student is not aware he or she kicks the wires a spark will be projected leading to a fire
in the computer room.

 Electricity power cuts

Electric cables for the desktop, monitor and everything connected are under the desk where
students put their legs and if a student is not aware he or she kicks the main plug and if it
disconnects it will lead force shutting down of desktops which then cause loss of data.
Electricity is a major threat at Waddilove High, if there is a power cut whilst someone is using
the computer there will be loss of data which has not been saved.
MUPONDI MIRIRAI

 Water

Some students bring their juice bottles with liquid which by mistake can spill on desktops

 Dust

When wind blow the dust, particles enter the computer room and into the computer.
MUPONDI MIRIRAI

SUGGEST PREVENTION MEASURES TO IDENTIFIED THREATS

 For viruses

The school must install antivirus software on all the computers and update antivirus frequently.
MUPONDI MIRIRAI

They must use anti-virus and threat protection

 Protect a device from threats


 Always connect to the internet to update virus and threat protection
 Always update windows security (Virus and Threat protection)
MUPONDI MIRIRAI

 Hardware theft and vandalism


Only computer science students are allowed in the laboratory. Harsh punishment to
anyone caught. Use security lock to lock when late.

 Software Theft

Make use of complicated passwords that consist of all characters, numbers and letters. For
example

#.115#LINA

Always keep backup so as to restore all information.

Practise data encryption

 Fire

Always keep a fire extinguisher which is working and check it regularly.

Electricity power cuts

Installation of solar panels that work all day automatically.

 Dust
MUPONDI MIRIRAI

Always keep the laboratory clean and use cloth to remove dust from hardware every
morning.

MAKE USE OF FANS


MUPONDI MIRIRAI

You might also like