Lesson Notes By Weeks and Term - Senior Secondary School 2

Data insecurity

Class: SSS 2

Term: 2nd Term

Subject: Computer Science

Week 6 Topic: File Insecurity

This is the concept that a file is always vulnerable and is prone to be lost or missing in the computer. File security is a feature of your file system which controls which users can access which files, and places limitations on what users can do to various files in your computer.

  

Effect of File Insecurity

  1. Loss of Data: Computer users and experts often experience data loss when files are destroyed, and sometimes there is no hope of recovery and this is as a result of files being tampered with on the computer or through virus invasion or sudden crash of the operating
  2. Overwriting: This is a process of writing a binary set of data on a Data that has been overwritten is generally considered to be unrecoverable.
  3. Dis-orientation of file system: As a result of someone tampering with the computer system, there may be displacement of files and re-arrangement of file

 

Methods of File Security

  1. Lock computers away when leaving the office, if Turn computer screens away from windows.
  2. Use surge protectors for all power outlets (variations in the electrical current can damage your computer).
  3. Back-up refers to making copies of data so that these additional copies are used to restore the original after It is also a method of making copies of the file in a separate location so that they can be restored if something happens to the computer. This can be done by using removable media such as re-writable CD, memory card, flash etc. Keep back-up information, including paper files, in a secure, separate location. Make sure your back-ups are secure by keeping them on an encrypted computer hard drive with a secure data back-up organisation, or secured by sophisticated physical locks.
  1. To reduce the risk of someone accessing your computer, use password to protect your computer and always shut down your computer when you are not using, don’t
  2. Encrypt your files in case someone does access your computer or bypasses your password
  3. If your computer is stolen or destroyed, you will still be able to recover your files if you have created a secure back-up every Keep the encrypted back-ups away from your office in a safe place or external hard drive.
  4. Erased files cannot be reconstructed if you have wiped them using PGP Wipe or another utility, instead of just placing them in the computer’s trash or recycle
  5. Virus is a self – replicating program that copies itself and that can infect other programs by modifying them or their environment such that a call to an infected program implies a call to a The use of an anti-virus is important to protect your computer.

An antivirus is a software used to protect your computer from viruses that may try to infect your computer or might have done so already. Anti-viruses are used to scan files in the computer in order to detect virus-infected files.

  1. Your computer can be programmed to send out your files or otherwise make you vulnerable without your To avoid this, purchase your computer from a trusted source, format the computer hard drive when you first get it, and then only install the software you want. Only allow trusted technicians to service your computer and watch them at all times.
  1. Consider unplugging your computer’s phone connection/modem, or otherwise physically disabling your internet connection, when leaving the machine unattended. This way, rogue programs or viruses in disguise will not be able to access your Never leave your computer on when you leave for the day. Consider installing software that will disable access after a certain set time of inactivity. This way, your machine is not vulnerable while you are busy with something else.
  2. In your web preferences, enable file extensions in order to tell what kind of file it is before you open You don’t want to launch a virus by opening an executable file that you thought was a text file. In Internet Explorer, go to the Tools menu and choose Folder Options. Click View and make sure the box Hide extensions for known file types is NOT checked.

 

 

ASSESSMENT

  1. is the concept that a file is always vulnerable and is prone to be lost or missing in the computer
    • file security
    • file insecurity
    • file attack
    • file crime
  2. The process of writing a binary set of data on a memory is known as
    • overwriting
    • loss of data
    • underwriting
    • deleting
  3. refers to making copies of data so that these additional copies are used to restore the original after loss
    • backup
    • backfront
    • backdown
    • back centre
  1. The self – replicating program that copies itself and that can infect other programs by modifying them or their environment is known as
    • bacteria
    • fungi
    • virus
    • hydra
  2. To avoid making your computer vulnerable without your knowledge, you should do all these except
    • purchase your computer from a trusted source
    • format the computer hard drive when you first get it
    • only install the software you want
    • make your computer easy to access 

ANSWERS

  1. b
  2. a
  3. a
  4. c
  5. d


© Lesson Notes All Rights Reserved 2023