Digital Literacy Most Critical
Digital Literacy Most Critical
CONTROL
Data Security and Controls
Data security is the protection of programs and data in computers and communication
systems, against unauthorized modification, destruction, disclosure or transfer, whether
accidental or intentional.
Data and information privacy Private data or information is that which belongs to an
individual and must not be accessed or disclosed to any other person unless with direct
permission from the owner. Confidential data – data or information held by a
government or organization about people , must be protected against unauthorized access
or disclosure.
Data security core principles
Also referred to as information security. They are; Confidentiality, Integrity and Availability.
Confidentiality
Sensitive data or information like employees’ details, business financial, etc belonging to
the organization or government should not be accessed by or disclosed to unauthorized
people. Integrity
Means that data should not be modified with without owners’ authority.
Availability
Information must be available on demand.
Security threats and control measures
Viruses The term virus stands for: Vital Information Resource Under Siege
A virus is a program that will change the operation of the computer without the user’s
information. Viruses attach themselves to computer files called executable files such that
any time such programs are run a copy of the virus is sent out. So it duplicates itself
continuously.
- A destructive program that attaches itself to other files and installs itself without
permission on the computer when the files are opened for use.
Types of computer viruses
Boot sector – they destroy the booting information on storage media.
File viruses – attach themselves to files
Hoax viruses – come as e-mail with an attractive subject and launches itself when e-mail
is opened.
Trojans Horse – they perform undesirable activities in the background without user
knowledge.
Backdoors – may be a Trojan or worm that allows hidden access to a computer system.
Worms – it attaches it self on non-executable files and it self-replicates clogging the system
memory and storage media. When a document is emailed the worm travels with it and
through that easily spreads to other computers on a network.
Note: The main difference between a virus and a worm is that a viruses attaches themselves
to computer executable files while a worm attaches it self on non-executable files in the
computer. Symptoms of a computer affected by viruses
- Unfamiliar graphics or quizzical messages appearing on screen.
- Program taking longer to load
- Slow – down of the general operation
- Unusual and frequent error messages occurring more frequently
NYS INSTITUTE OF SOCIAL STUDIES ICT NOTES –JEREMIAH DEENAMBO
- Access light turning on for non-referenced devices
- Programs / files mysteriously disappearing
- Executable files changing size for no obvious reason.
- Change in file size
- Loss or change in the file size
- Loss or change of data
- Disk access seeming excessive for simple tasks
- System crash
- Files and programs disappearing mysteriously - Disk access seems excessive for simple
tasks
Sources of virus into the computer system
- Copies of pirated software
- Fake computer games
- Freeware / Shareware and bulletin board programs that have not been checked for viruses.
- Using infected disks from vendors, consulting firms, computer repair shops and main-order
houses.
- Downloading and opening infected files from the Internet.
- Hackers intent on malicious destruction of networked systems to which they have gained
unauthorized.
- Infected proprietary (private) software - Updates of software distributed via networks.
- E-mail attachments
- Contacts with contaminated systems e.g. diskettes, flash disks, CDs, etc.
Control measures against viruses
- Install the most latest version of antivirus software on the computer
- Avoid foreign diskettes in the computer system
- Avoid opening mail attachments before scanning for viruses
- Regular backing-up of all software and data files. Files back-up can be used to restore lost
files in the event of a system failure.
- When opening e-mails, user should not open attachments from unknown senders.
- All unlicensed software should be carefully examined before use.
- Always check for virus on portable disks when used to move files between computers.
Information system failure
Some of the causes include;
Hardware failure due to improper use
Unstable power supply as a result of brownout or blackout and vandalism
Network breakdown
Natural disaster
Program failure
Control measures
Use surge protectors and UPS to protect computer systems against brownout or black
out which causes physical damage or data loss.
Install a Fault Tolerant system which has the ability to preserve the integrity electronic
data during hardware or software malfunction.
Disaster recovery plans by establishing offsite storage of an organizations databases so
that incase of disaster or fire accidents, the backedup copies are used to reconstruct lost
data.
Trespass
This is the act of gaining access or entering into a computer system without legal permission.
Cracking
Refers to the use of guess work over and over again, by a person until he/she finally discovers
a weak in the security policies or codes of software. Alternatively refers to someone using his
/ her knowledge of information systems to illegally or unethically penetrate computers systems
for personal gain.
Hacking
Refers to when an individual intentionally breaks codes and passwords top gain unauthorized
access into a computer system, but without intent of causing damage. Tapping
Tapping is when someone gains access to information that is being transmitted via
communication links. Any information that is transmitted across a network is at risk of being
intercepted, if appropriate security measures are not put in place.
Phishing: is a form of social engineering where attackers deceive people into revealing
sensitive information or installing malware such as ransomware
Piracy
Is the act of making illegal copies of copyrighted software, information or data.
To eliminate piracy
- Make software cheap, enough to increase affordability
- Use licenses and certificate to identify originals
- Set installation password to deter illegal installation of software
- Enforce laws that protect the owners of data and information against piracy.
Fraud
Refers to leaking personal or organizational information using a computer with the intention
of gaining money or information.
Example of fraud is where one person created an intelligent program in the tax department
that could credit his account with cents from all the tax payers. He ended up becoming very
rich before he was discovered.
Alteration
Refers to illegal changing of data and information with the aim of gaining or misinforming the
authorized users. When a system is compromised the data lacks reliability, relevance and
integrity. Example of data alteration are when students break into system to alter exam results,
or someone breaks into a banking system to change account details or divert money.
Spam
A spam is unsolicited electronic junk mail, often commercial, message transmitted through
the Internet as a mass mailing to a large number of recipients. Is send by a person gaining
access to a list of e-mail addresses and redirecting the e-mail through the Mail Server of an
unsuspecting host, making the actual sender of the spam difficult to trace. Spam is annoying,
but usually harmless, except in cases where it contains links to web sites. Clicking on these
links may sometimes leave your system open to hackers or crackers. Junk – is meaningless
or worthless information received through e-mail
NYS INSTITUTE OF SOCIAL STUDIES ICT NOTES –JEREMIAH DEENAMBO
Description and protection against computer crimes Audit trail
Computer Audit Trails are used to keep a record of who has accessed a computer system
and what operations he or she has performed during the given period of time. Audit Trails
are useful both for maintaining security and for recovering lost transactions. Audit Trails
help to detect trespassing and alterations. Incase the system is broken into by a hacker;
an Audit Trail enables their activities to be tracked. Any unauthorized alterations can be
rolled back to take the system back the state it was in before the alterations
were done
Data encryption
Data encryption is a means of scrambling (or ciphering) data so that it can only be read
by the person holding the encryption ‘Key or ‘algorithm’. The key is a list codes for
translating encrypted data – a password of some sort. Without the key, the cipher cannot
be broken and the data remains secure. Using the Key, the cipher is decrypted and the
data remains secure. Using the Key, the cipher is decrypted and the data is returned to its
original value or state. Each time one encrypts data a key is randomly generated. The
same key is used by the data recipient to decrypt the data. Data encryption is a useful tool
against network snooping (or tapping).
Log files
They are special system files that keep a record (log) of events on the use of the
computers and resources of the information system. The information system administrator
can therefore easily track who accessed the system, when and what they did on the
system.
Firewalls A firewall is a program or hardware that filters information coming through the
Internet and connection into your personal computer or network. Firewalls can prevent
unauthorized remote logins, limit or stop Spam, and filter the content that is downloaded
from the Internet. Some Firewalls offer virus protection, but it is worth the investment to
install Anti-Virus software on each computer. Security monitors These are programs that
monitor and keep a log file or record of computer systems and protect them from
unauthorized access.
Biometric security – is unauthorized control measure that takes the user’s attributes such
as voice, fingerprints and facial recognition. Authentication policies such as signing users
log on accounts, use of smart cards and Personal Identification Number (PIN).
Menu bar: ribbon that contains list of menus like home, insert design, page layout etc
Tool bar: its just below the menu bar , each menu displays different tools when clicked ,
tools are just the icons representing commands e.g scissors icon represents cut,
B=bolding
,I=italicizing
Status bar : its horizontal strip at the bottom of the application window, it displays
various status information like pages and number of words
Saving word document
Saving refers to storing the created document for future use, its important to save a
document as you work on it to avoid losing it incase of blackouts. There is two types of
saving a documents (i) Save as (ii) Save
Save as: allows the user to save a new document for the first time or change the storage
location of a document
Save : allows the user to save changes/updates on the current documents
Editing word document
Editing refers us to making necessary modifications to the existing word document , Ms
word provides editing tools which are automated. They include
• Spelling and grammer checker: it’s a tool that automatically detects wrong
spelled word and corrects it, as well as correcting grammar, this tool can correct
words only avaible in computer dictionary. The tool always underline the word with
red line indicating wrong spelling incase the word doesn’t exist in the dictionary
green arrow means grammer error or spacing
• Autocorrect and autocomplete: The autocorrect automatically detects wrongly
spelled word and corrects it , while autocomplete completes the word after the user
types few first characters /prefix.
NYS INSTITUTE OF SOCIAL STUDIES ICT NOTES –JEREMIAH DEENAMBO
• Thesaurus: This tool helps to find word with similar meaning (synonyms) at words
with opposite meaning (antonyms)
• Undo-redo: undo command reverse the mostly recent executed command, re-do
reverts back
Formatting word document
Formatting document refers to enhancing the appearance of document making it neat and
attractive. Word processer has the following formatting
• Text formatting
• Paragraph formatting
• Page formatting
Text formatting
Enhancing the appearance of characters, it includes
• Font colour : changing the colour of texts
• Underlining : putting a line at the base/bottom of a word
• Bolding : make text appear more dark than the rest
• Italicizing : make characters slant forward
• Change case :change characters from capital letter to small and vice-versa other
cases include:
a) Sentence case: first character of a sentence begins with capital latter
b) Upper case: all text in capital letters
c) Lower case: all text in small letters
d) Title case : first character of every word appears in capital letters
• Superscript: refers to a character that appears above the rest e.g 10th
• Subscript: refers to a character that appears below the rest e.g H2O
Paragraph formatting
Paragraph formatting involve entire block of texts , paragraph formatting include:
• Drop cap: marking the first character of a sentence appear bigger and occupy
more space
• Text Alignment: positioning text relatively to the margins. Types of Alignment
include
a) Left alignment : lines of text are aligned evenly along left margins
b) Right alignment : lines of text are aligned ev alignment : lines of text are
aligned evenly along right margins
c) Centre alignment : texts are centered evenly
d) Justification : text are aligned evenly along left and right margins
• Text indenting: it refers to the distance /black space to separate paragraph with
left/right margins. It includes first line indent, full paragraph indent , hanging indent
.
• Line spacing : the vertical distance between lines of text, it includes , single
spacing double spacing
• Bullet and numbering: ordered list
• Columns: the portioned paragraphs into vertical blocks
• Page orientation: the layout of the page on the on the screen and the printout,
two types of orientations include portrait and landscape
• Page numbering: process of inserting sequence of numbers or letters to a page
Sign Name
- Minus
* Multiplication
/ Division
+ Addition
Relational operators
= Equal to
> Greater than
< Less than
<> Not equal to
<= Less than or equal to
>= Greater than or equal
Functions
A predefined formulae that performs simple to complex calculation by just giving them
values called arguments, functions uses keywords like sum, average , min(minimum)
max (maxium) e.t.c, they always begging with equals signs
Cell referencing
Cell referencing is the range /arrangement of cells when creating a formulae or
function. There is three types of cell referencing:
a) Relative cell referencing
b) Absolute cell referencing
c) Mixed cell referencing
Relative cell referencing: this is where the cell range changes when copied /auto
filled to a different location e.g a formulae = A1+B1 is copied to C2 it changes A2+B2
, the formulae changes automatically when copied to reflect new location
Absolute cell referencing: in this case the formulae doesn’t change even if its
copied to another location, it always made by placing a dollar sign before the
reference =$A$A Mixed cell referencing: this combines both absolute and
relative referencing Excel functions
Functions are predefined formulae that users are provided by excel to perform simple
to complex maths. Function uses Key words e.g sum, average etc, they must/always
begin with equal signs
(=) followed by function name then the argument /criteria
The argument/criteria is enclosed in brackets argument/criteria can be value , text or
formulae separated with comma. Function s are categorized into
• Mathematical /trigonometry
• Statistical
• Logical
10
• Date/time
Mathematical/trigonometry : used to perform mathematical and trigonometry
tasks they include =sum () for addition
• =round () for rounding number to nearest specified decimal point
e.g =Round (49.769,0)= 50
• =sumif() addition with specified condition
Statistical function: used to anal, median, variance standard deviation, they include
• Average(): it gives the mean given numerical values
• Max() : returns the highest number amongst the given values
• Min () returns lowest value amongst given value
Logical functions: this is a function that gives true or false, logical functions include
If () this returns value or label used depending on the criteria set, it returns either
true or false, the if function is the most used for scores and grading other logical
functions include AND, NOT, OR Date and time: used to manipulate date, time
arguments, they include
=today () returns todays date
=now () gives current date and time
Excel charts
Charts are also known as graphs, they sre visually appealing objects generated
from numerical data on worksheets Types of excel charts
• Column chart: displays vertical bars going across the chart horizontally with
values displayed on the y-axis
• Line chart: data points are connected with lines making it easy to see the
trends
• Pie chart: values are shown as a slice of pie or circle, it compares proportions
in a whole e.g percentage
• Bar : resembles column but the bars are horizontally across the chart
• Xy(scatter)
• Stoc
E-mail facilities
1). Mails
a) Checking mails
In order to check mail the user has to open the e-mail account by providing the
correct user name and password.
b) Compose e-mail
Composing implies writing. To compose click the compose command. The command
header element in the new e-mail window are:
To: here, you enter the e-mail address of the recipient.
From: here, your e-mail software will enter your address automatically.
Subject: should contain a few words outlining the nature of your message.
It is not mandatory to enter something here, but it generally helps the
recipient to know what is contained in the e-mail.
Cc: stands for Carbon Copy, and is used to copy an e-mail to other
recipients. The main recipient is able to see who the e-mail has been copied
to.
BCC: stands for blind Carbon Copy, meaning that a copy of your message is
sent to an extra address, without any indication of that action appearing in
the main recipients copy of the message.
17
Date: the date and time the message is sent are indicated automatically
from e-mail software.
Attachments – the name and location of any file you may be sending along
with the e-mail
c) Sending e-mail
To send mail, type the correct e-mail address of the recipient in To: text box, type
your letter then click Send command.
d) Forward e-mail – a received mail can be forwarded to another recipient. After
reading click Forward command and then provide the address of the recipient.
2). File Attachment
E-mail software enables a person to attach other files like pictures, music, movie clips,
etc. the source of attachment files can be from the hard disk or other storage devices
3). On-line meeting
It’s possible to hold on-line meeting with people by sending mails to them. E.g. on-
line interviews may involve a person sending electronic mail composed of interview
questions to a recipient who can read and question back.
4). Telephone messages
Because of integration between mobile telephony and the Internet technology,
wireless Access Protocol (WAP) makes it possible to send e-mail to a mobile handset
and a mobile message to e-mail account.
5). Contact management
Most mails programs allow the user to develop an address book which holds contact
information like e-mail address of different people.
Accessing Information on Emerging Issues
Internet is a storehouse of information, presented in the from of text, documents,
pictures, sound and even video. Emerging issues refers to things like HIV/Aids, drug
Abuse, moral issues and environmental issues.
Effect of internet on the society
Although internet is such an important resource, it has also brought with it some
challenges. These include;
18
Accessibility of dirty sites such as pornography by the young hence affecting
their morals. The solution is to restrict the known offensive sites using filter
programs such as CyberPatrol, Cybersitter or net Nanny.
Security and privacy – Internet has made it easy for criminals to illegally
access organizations private information hence posing security concerns. To
improve on security, install a Firewall and antispyware programs.
Spread of malicious software – which includes Viruses, Trojan horse and
worm. This results in frustration and loss of data. Install Internet security
program and update it regularly.
19