MUPONDI MIRIRAI
CALA COMPONENT A
CANDIDATE NAME MUPONDI MIRIRAI
LEARNNG AREA COMPUTER SCIENCE
LEVEL FORM 6
CALA TYPE PRACTICAL
SYLLABUS TOPIC SECURITY AND ETHICS SYLLABUS PG 12
SUB TOPIC COMMON THREATS AND VULNERABLITIES
CALA TITLE THREATS AND VULNERABILITIES
COMPETENCIES/SKILLS:
Research, Creation, Problem solving
BACKGROUND
We are all continuously at risk from security threats to systems we use ourselves and to all of
the systems used by organizations upon which we rely. The dominant factor is that none of
these systems are stand-alone; all are connected to networks and through these networks to
the Internet. Using your school as a case study you are required to perform the following
activities.
CALA DESCRIPTION
YOU WILL BE ASSESSED IN THE FOLLOWING AREAS.
Part A
Analyze common threats and vulnerabilities on computer systems at your school. [15]
Part B
Suggest major counter measures to the common threats and vulnerabilities. [10]
Cala tip
MUPONDI MIRIRAI
Where possible take pictures and screenshots to show the threats as we as on suggested solutions.
1.Identify threats to data and computers at your school [10]
2.Suggests preventative measures to the identified problems [15]
IDENTIFY THREAT TO DATA AND COMPUTER SYSTEMS AT YOUR SCHOOL
Threats
Definition
A threat is an event with the potential to cause harm to data and computer systems. A threat
may happen or may not happen but has the potential to cause harm. Examples include fire,
viruses, and hackers among other threats.
THREATS AT WADDILOVE HIGH SCHOOL
Virus
. A virus is a piece of software that can replicate itself and affect a computer without the
permission of the user and can only spread when it attaches itself to another program. Learners
may use flash drives to transfer information between their computer which leads to the wide
spread of viruses in the school laboratory computers.
Viruses can cause a computer to display abnormal applications or enables installation of
unknown applications. Moreover, they force stop some functions, replicate and causes slow
booting and processing of computers.
Hardware theft and vandalism
Hardware theft is an act of stealing computer equipment and hardware vandalism is an act of
destroying computer equipment physically. Some students enter the laboratory with the aim of
stealing hardware such as mouses. Some steal mice to use on their laptops at home school
desktops. More over some has extended to steal power packs and wires and others practise
their architecture on school desktops.
MUPONDI MIRIRAI
MUPONDI MIRIRAI
Software theft
Software theft is whereby someone steals software media, intentionally erases programs,
illegally registers and activates a program. This usually happens to candidates who prepare
their projects, as a way of fixing each other one can just enter the person’s account and delete
the whole project towards submission of projects so that even if that person is willing to repeat
there will be no time.
MUPONDI MIRIRAI
Fire
Students’ plug-in too much cables on one plug which cause electricity to spark and burn the
nearby obstacles causing large flames which will destroy the laboratory. Electric cables for the
desktop, monitor and everything connected are under the desk where students put their legs
and if a student is not aware he or she kicks the wires a spark will be projected leading to a fire
in the computer room.
Electricity power cuts
Electric cables for the desktop, monitor and everything connected are under the desk where
students put their legs and if a student is not aware he or she kicks the main plug and if it
disconnects it will lead force shutting down of desktops which then cause loss of data.
Electricity is a major threat at Waddilove High, if there is a power cut whilst someone is using
the computer there will be loss of data which has not been saved.
MUPONDI MIRIRAI
Water
Some students bring their juice bottles with liquid which by mistake can spill on desktops
Dust
When wind blow the dust, particles enter the computer room and into the computer.
MUPONDI MIRIRAI
SUGGEST PREVENTION MEASURES TO IDENTIFIED THREATS
For viruses
The school must install antivirus software on all the computers and update antivirus frequently.
MUPONDI MIRIRAI
They must use anti-virus and threat protection
Protect a device from threats
Always connect to the internet to update virus and threat protection
Always update windows security (Virus and Threat protection)
MUPONDI MIRIRAI
Hardware theft and vandalism
Only computer science students are allowed in the laboratory. Harsh punishment to
anyone caught. Use security lock to lock when late.
Software Theft
Make use of complicated passwords that consist of all characters, numbers and letters. For
example
#.115#LINA
Always keep backup so as to restore all information.
Practise data encryption
Fire
Always keep a fire extinguisher which is working and check it regularly.
Electricity power cuts
Installation of solar panels that work all day automatically.
Dust
MUPONDI MIRIRAI
Always keep the laboratory clean and use cloth to remove dust from hardware every
morning.
MAKE USE OF FANS
MUPONDI MIRIRAI