0% found this document useful (0 votes)
117 views

Week 1 - Computer Appreciation CMDI (3) - Merged

This document provides an overview of computer and network security. It begins with the module learning objectives which are to identify factors driving network security needs, classify attack examples, and define security terms. The document then gives a brief history of computer security, highlighting early computer bugs, phone hacking incidents, the creation of computer worms and viruses, and some of the first known viruses. It provides context around the development of security threats and issues over time.

Uploaded by

Claire Barba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views

Week 1 - Computer Appreciation CMDI (3) - Merged

This document provides an overview of computer and network security. It begins with the module learning objectives which are to identify factors driving network security needs, classify attack examples, and define security terms. The document then gives a brief history of computer security, highlighting early computer bugs, phone hacking incidents, the creation of computer worms and viruses, and some of the first known viruses. It provides context around the development of security threats and issues over time.

Uploaded by

Claire Barba
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 72

Week 1

Computer Appreciation
Module Description
Computer Appreciation
Module Learning Objectives
• Demonstrate understanding of the fundamental hardware
components that make up a computer’s hardware and the
role of each of these components
• Demonstrate understanding of the difference between an
operating system and an application program, and what
each is used for in a computer
• Explain the fundamental concepts of computer hardware
and software
• Acquire the foundation level knowledge required to
understand computer and its operations.
Information Processing System
• DATA is a collection of independent and unorganized
facts.

• INFORMATION is the processed and organized data


presented in a meaningful form.

• DATA PROCESSING is the course of doing things in a


sequence of steps.

• COMPUTER is an electronic machine that follows a set


of instructions in order that it may be able to accept and
gather data and transform these into information.
PROCESSING
SYSTEM

INFORMATION
DATA
Functions of an Information Processing System

1. It accepts and gather data. (INPUT)


2. It processes data to become information.
(PROCESSING)
3. It stores data and information. (STORE)
4. It presents information. (OUTPUT)
Basic Units of Measurement
• BIT is a unit of information equivalent to the result of a choice
between only 2 possible alternatives in the binary number
system.

• BYTE is a sequence of 8 bits (enough to represent one


character of alphanumeric data) processed as a single unit for
information.

• A byte can be used to represent a single character, which can be:

• A letter
• A number
• A special character or symbol, or
• A space
BASIC PC HARDWARE
• HARDWARE is the tangible part of a computer
system.
Basic hardware of a PC system
• Central Processing Unit (CPU)

• Memory Unit

• Input Devices

• Output Devices

• Secondary Storage Devices


1. Central Processing Unit
• Brain of the computer.
• It directs and controls the entire computer system
and performs all arithmetic and logical operations.
2. Memory Unit
• Where the programs and data are
stored .
• READ ONLY MEMORY
(ROM) contains the pre-
programmed computer
instructions such as the Basic
Input Output System (BIOS).

• RANDOM ACCESS
MEMORY (RAM) is used to
store the programs and data
that you will run. Exists only
when there is power.
3. Input Devices

• Allows data and programs to


be sent to the CPU.

• Keyboard
• Mouse
• Joystick
• Microphone
• Webcam
• Scanner
• Monitor
Two Types of Mouse
• Mechanical - a type of
computer mouse that
has a rubber or metal
ball on its underside and
it can roll in every
direction. 

• Optical:  This type uses


a laser for detecting the
mouse's movement. 
How a Mouse Hooks Up to a PC
• PS/2 Mouse

• Serial Mouse

• USB/Cordless Mouse
Other Pointing Devices
• Trackball

• Track point

• Touch pad

• Touch Screen
• Joystick – input device for
computer games

• Light Pens – light-sensitive penlike


device

• Stylus – penlike device commonly


used with tablet PCs and PDAs.
Scanning Devices
• Optical scanners
• Card readers
• Bar code readers
• Character and mark recognition
devices
4. Output Devices
• Media used by the computer in displaying its
responses to our requests and instructions.

• Monitor

• Audio Speakers

• Printer
Types of Monitor

• Cathode Ray Tube (CRT)

• Liquid Crystal Display (LCD)


Printers

• IMPACT PRINTERS uses pressure by physically


striking the paper. Ex. Daisy wheel printers, line
printers, dot matrix printers & band printers.

• NON-IMPACT PRINTER does not apply pressure


on the paper but instead produces character by
using lasers, ink spray, photography or heat.
Dot matrix printer

Laser
printer Inkjet printer
5. Secondary Storage Devices

• Attached to the computer system to allow you to


store programs and data permanently for the
purpose of retrieving them for future use.

• Floppy disk, Hard disk, CD Rom


Floppy Disk

• The most common secondary storage device

• 3.5” disk – 1.44MB


High-Capacity Floppy Disks

• Floppy disk cartridges


• 3 ½ inches in diameter
• Stores more information
• Zip disks
Hard Disk Drive or Hard Disk

• Made of rigid materials unlike floppy disks


• Holds a greater amount of data
Optical Discs

• A standard part of modern desktop machines,


especially used for multimedia purposes and
preferred in loading applications.
Kinds of Discs
• Blue Ray Disk – 40G

• Digital Versatile Disk


• DVD-R – write once, 3.95G
• DVD RW – rewritable, 3G
• Single Layer and Double Layer

• Compact Disk
• CD-R – write once, 650MB
• CD-RW – rewritable, 700MB
Optical Drives

• CD-ROM read CDs


• CD-Writer read/write CDs
• DVD-Combo read/write CDs, read DVD
• DVD Writer read/write CDs
read/write DVDs
Other Secondary Storage
• Solid-State Storage
• No moving parts
• Flash memory cards

• USB flash drives


Parts that Build Up A System Unit

• Casing or cover • Sound card


• Power Supply • Floppy disk drive
• Motherboard • Hard disk drive
• Microprocessor • CD-ROM drive
• Memory • MODEM
• Video Card
Casing or cover

• The box or outer shell that


houses most of the
computer, it is usually one
of the most overlooked
parts of the PC.

• Protects the computer


circuits, cooling and system
organization.
Power Supply

• Responsible for powering


every device in your computer.

• Parts of a Power supply:


• Disk drive connectors
• Motherboard connector
• Power supply fan
• Power switch
• Input voltage selector
• Cover
• Power plugs receptacle
Motherboard

• The physical arrangement in a computer that


contains the computer’s basic circuitry and
components.

• Components are:
• Microprocessor
• (Optional) Coprocessors
• Memory
• Basic Input/Output System (BIOS)
• Expansion Slot
• Interconnecting circuitry
Software

• Instructions that tell the computer how to process data into


the form you want.

• Software and programs are interchangeable.

• Two major types:


• System and Applications
2 Kinds of Software

1. System Software enables the application software to


interact with the computer hardware.

• Operating Systems are programs that coordinate


computer resources, provide an interface between
users and the computer; and run applications.
• Utilities perform specific tasks related to managing
computer resources.
Functions of a System Software
• Managing resources (memory, processing, storage,
and devices like printer).
• Providing user interface
• Running applications
2. Applications Software - provides the real functionality
of a computer. It help you use your computer to do
specific types of work.

• Basic Applications, widely used in all career areas.


• Specialized Applications, more narrowly focused on
specific disciplines and occupations.
Activity:
• List down at least 5 characteristics of a Computer.
• Give at least 5 benefits of using computer.

Be ready and prepared for I will call your name


randomly.

Good Luck!
Week 4
Computer and Network
Security
Module Description
Module Learning Objectives

• Identify some of the factors driving the need for


network security
• Identify and classify particular examples of attacks
• Define the terms vulnerability, threat and attack
• Identify physical points of vulnerability in simple
networks
• Compare the symmetric and asymmetric encryption
systems
• Explain the characteristics of hybrid systems.
History of Computer Security

• 1945

Rear admiral Grace Murray


Hopper finds a moth among
the relays of a Navy computer
and calls it a “bug.”

She later creates the term


“debugging.”
• 1964

AT&T starts monitoring toll calls to catch “phone


freaks,” or “phreakers,” who obtain free phone calls
by the use of tone-producing “blue boxes.” The
monitoring ends in 1970, resulting in 200
convictions.
• 1972

John Draper, A.K.A. “Captain Crunch,” discovers that


free phone calls can be made with the use of a blue
box and a plastic toy whistle that comes in Cap’n
Crunch cereal boxes.

The whistle duplicatesa 2600-hertz tone to unlock


AT&T’s phone network.
• 1979

The first computer “worm” is created at “


Xerox’s Palo Alto Research Center".

The program is meant to make computers


more efficient, but later hackers modify
worms into computer viruses that destroy
or alter data.
• 1983

Fred Cohen, a University of Southern California


doctoral student, comes up with term “computer
virus.”

• 1986

The first PC virus, “the Brain,” is created. The Brain,


however is not destructive, and the creators
included their contact information with it.
• 1988

A worm is uploaded to ARPANET (Advanced


Research Projects Agency Network), the ancestor of
the Internet, disabling about 6,000 computers by
replicating itself and filling their memory banks.

Robert Morris, who created and unleashed the virus


out of boredom, received three years’ probation and a
$10,000 penalty.
• 1995

Concept, the first Microsoft Word-based virus, spreads


worldwide using macro commands. The virus is spread by
opening an infected Word document.

• 1998

“Solar Sunrise” occurs when hackers take control of over 500


government, military, and private computer systems.

Authorities eventually learn that two California teenagers


coordinated the attacks.
• 2000

Hackers use computers at the University of California-Santa


Barbara to crash Amazon, Yahoo, eBay, and other
websites by flooding their sites with trac.

• 2001

The Code Red worm causes $2 billion in damage by


infecting Microsoft Windows NT and Windows2000 server
software. The virus attempts to use all infected computers to
attack the White House website simultaneously, but the
worm’s code is deciphered in time and the attack is blocked.
• 2005

Users of computers infected with Poison Ivy find their


computers remotely controlled via the virus. The remote
access trojan is used to attack not only personal computers,
but chemical and defense companies as well.

• 2006

Between 469,000 and 1 million computers are infected by


the Nyxem virus, which overwrites files on the third of every
month. The virus is spread by email attachments and targets
files with extensions such as .doc, .xls, .ppt, .zip, .pdf, etc.
• 2007

The Storm Worm virus (actually a trojan) is sent to


unsuspecting individuals via emails with headlines about a
recent European days disaster. Within three of its release the
virus accounts for 8% of all infections.

• 2010

Stuxnet, a virus created for industrial and economic attacks,


is discovered. The worm targets systems used to run nuclear
power plants and water facilities and is so large and complex,
estimates suggest it was developed by the U.S. or Israeli
governments and took more than 10 years to develop.
• 2014

One dozen Russian hackers steal more than 1.2


billion matching passwords and usernames, and
over 500 million email address. The heist is
accomplished using viruses to test and exploit
vulnerabilities in websites’ SQL code.
Computer Security

• Computer security is the process of preventing and


detecting unauthorized use of your computer.

• Prevention measures help you to stop unauthorized


users (also known as "intruders") from accessing
any part of your computer system.

• Detection helps you to determine whether or not


someone attempted to break into your system, if
they were successful, and what they may have
done.
Data Security

• Data security is the practice of keeping data


protected from corruption and Unauthorized
access. The focus behind data security is to
ensure privacy while protecting personal or
corporate data.
Information technology security

Information technology security is the process


of protecting computers, networks, programs
and data from unintended or unauthorized
access, change or destruction.
Why should I care about computer security?

• We use computers for everything from banking and


investing to shopping and communicating with
others through email or chat programs.

•  Governments, military, corporations, financial


institutions, hospitals and other businesses collect,
process and store a great deal of confidential
information on computers.

• Transmit that data across networks to other


computers.
• With the growing volume and sophistication of
computer and network attacks.

• ongoing attention is required to protect sensitive


business and personal information, as well as
safeguard national security.

• During a Senate hearing in March 2013, the


nation's top intelligence officials warned that
information technology attacks and digital spying
are the top threat to national security, eclipsing
terrorism.
Who would want to break into my computer at home?

• Intruders (also referred to as hackers, attackers, or


crackers) may not care about your identity.

• they want to gain control of your computer so they


can a use it to launch attacks on other computer
systems.

• Having control of your computer gives them the


ability to hide their true location as they launch
attacks.
• Even if you have a computer connected to the
Internet only to play the latest games or to send
email to friends and family, your computer may be
a target.

• Intruders may be able to watch all your actions on


the computer, or cause damage to your computer
by reformatting your hard drive or changing your
data.
Coals of Computer security (security principles)
• Integrity
Assurance that the information is authentic and complete.
Integrity is the principle of protecting information against
improper modification.

• Confidentiality
The information must just be accessible to the authorized
people.
Confidentiality is the principle of protecting information from
disclosure to unauthorized entities.
Access control, and cryptographic encryption of data over a
network or on a storage device are common techniques for
achieving confidentiality.
• Availability
Assurance that the systems responsible for delivering,
storing and processing information are accessible when
needed, by those who need them.

• Reliability
Computers should work without having unexpected
problems

• Authentication
Guarantee that only authorized persons can access to
the resources
Computer security concepts

Passive Attack
attempts to learn or make use of information from the
system but does not affect system resources.

Two types of passive attacks are:


 Release of message contents
 Traffic analysis.
• Active Attack
Modification of the data stream or the creation of a false
stream

Four types of active attacks


 Masquerade
 Replay
 Modification of messages
 Denial of service.
• Computer security risk
A computer security risk is any event or action that
could cause a loss of or damage to computer
hardware, software, data, information, or processing
capability.
 

• Computer crime
Any illegal act involving a computer generally is
referred to as a computer crime.
• Cracker
A cracker is someone with extensive computer knowledge
who accesses a computer or network illegally , someone
whose purpose is to destroy data, steal information, or
other malicious action

The general view is that, while hackers build things,


crackers break things.

• Cyber terrorist
A cyber terrorist is someone who uses the Internet or
network to destroy or damage computers for political
reasons.
• Rootkit
 A rootkit is a program that hides in a computer
and allows someone from a remote location to take
full control of the computer.
Types of Security

• Network Security
• System and software security
• Physical Security

• Network security
Network security refers to any activities designed to protect
your network. Specifically, these activities protect the
usability, reliability, integrity, and safety of your network and
data.

Effective network security targets a variety of threats and


stops them from entering or spreading on your network.
• Physical security
Physical security is the protection of personnel,
hardware, programs, networks, and data from
physical circumstances and events that could cause
serious losses or damage to data.

This includes protection From fire, natural disasters,


burglary, theft, vandalism, and terrorism.
Hackers

• In the computer security context, a hacker is


someone who seeks and exploits weaknesses in a
computer system or computer network. “a clever
programmer“.

•  Hackers may be motivated by a multitude of


reasons, such as profit, protest, challenge or
enjoyment.
Type of computer hackers

• White hat hacker

The term "white hat" refers to an ethical computer


hacker, or a computer security expert, who
specializes in hack testing to ensure the security of
an organization's information systems.

White hat hacker breaks security for non-malicious


reasons, perhaps to test their own security system .
Black hat hacker
 
• Black hat hacker known as crackers or dark-side
hackers. someone violating computer or Internet
security maliciously or for illegal personal gain.
 
 
Gray hat hacker
• A gray hat hacker is a combination of a black hat
and a white hat hacker.

You might also like