Lesson Notes By Weeks and Term - Senior Secondary 3

Computer security and ethics I

Term: 2nd Term

Week: 7

Class: Senior Secondary School 3

Age: 17 years

Duration: 40 minutes of 2 periods each

Date:       

Subject:      Computer studies and ICT

Topic:-       Computer security and ethics I

SPECIFIC OBJECTIVES:

At the end of the lesson, pupils should be able to

  1. Define computer security
  2. List out the sources of security breaches

INSTRUCTIONAL TECHNIQUES: Identification, explanation, questions and answers, demonstration, videos from source

INSTRUCTIONAL MATERIALS: Videos, loud speaker, pictures, Data Processing for senior Secondary Education by Hiit Plc, WAPB Computer Studies for Senior Secondary III by Adekunle et al, On-line Materials.

INSTRUCTIONAL PROCEDURES

PERIOD 1-2

PRESENTATION

TEACHER’S ACTIVITY

STUDENT’S ACTIVITY

STEP 1

INTRODUCTION

The teacher reviews the previous lesson on data representation

Students pay attention

STEP 2

EXPLANATION

He explains the meaning of computer security

 

Students pay attention and participates

STEP 3

DEMONSTRATION

He then lists outs the various sources of security breaches

Students pay attention and participate

STEP 4

NOTE TAKING

The teacher writes a summarized note on the board

The students copy the note in their books

 

NOTE

COMPUTER SECURITY AND ETHICS

Computer security is the protection of computer components such as hardware, software and data from unauthorized access.

The need for computer security is as a result of a number of security breaches.

SOURCES OF SECURITY BREACHES

Security breach is an act of breaking security policies, practises or procedures.

When security in computer is breached, it may result in the damage of vital file, failure of certain hardware components e.g. keyboard, mouse, printer, hard disk, ram etc, altered software programs etc.

 

The following are possible sources of security breaches

 

  1. Computer viruses 
  2. Hackers 
  3. Poorly maintained computer network 
  4. Poorly implemented or lack of ICT policy 
  5. Carelessness.

 

  1. Computer viruses

A computer virus is an executable program that is capable of replicating itself thereby causing great harm to files or other programs on the computer it infects.

 

A computer can easily spread from in computer to the other with the use of external storage media such as: flash drives, floppy disks and so on it can also be contacted by downloading an infected file from the internet. The two types of computer viruses are WORMS and Trojan Horses.

 a. WORMS: A worm is a virus program that copies and multiplies itself by using computer networks and security flaws. Example of latest worm is Stuxnet(discovered in 2010)

 b. TROJAN HORSES: A trojan horses is a computer program or file on the computer of a user that makes the computer susceptible to malicious intruders by allowing them to access and read users files. Trojan horses do not multiply themselves as in the case of worms. An example of the latest Trojan horse is Alureon(discovered in 2010)

 

  1. Hackers

A hacker is a clever programmer who tries to break into the computer systems.

A hacker understands the weak points in the security system and writes a program that will utilise the system. They are sometimes responsible for writing computer virus codes.

 

  1. Poorly implemented computer network.

A complex computer network may result into poor implementation and management which in turn may give room to intruders who will eventually invade the computer network to steal passwords, confidential files or even infect all the network files. 

 

  1. Poorly implemented or lack of ICT policy

When ICT security policy that controls or maintains the order in which people should conduct themselves when using ICT facilities barely exist due to poor implementation or ignorance, lawlessness will be in place and this can lead to security breach.

 

EVALUATION:    1. Define “computer security” and “security breach”

  1. List and explain the sources of security breaches

 

CLASSWORK: As in evaluation

CONCLUSION: The teacher commends the students positively