Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword
Like this
0 of .
Results for:
No results containing your search query
P. 1
Computer Security and Privacy

Computer Security and Privacy

Ratings: (0)|Views: 263 |Likes:
Published by api-3729315

More info:

Published by: api-3729315 on Oct 15, 2008
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as DOC, PDF, TXT or read online from Scribd
See more
See less





Microsoft Learning
Computer Security and Privacy

Your computer is a very valuable and important device and you might depend on it for many things that
you do throughout the day. Also, you might use computers for storing personal or official information,
which you cannot afford to lose. However, your computer and the data stored on it are vulnerable to
damage and destruction. Therefore, it is essential that you take some protective measures to keep your
computer secure and updated.

This course explains some of the common threats to your computer and how you can safeguard your
computer and the data stored on it from these threats.
Table of Contents
-Course Overview
Navigation Overview
Course Information
-Computer Security and Privacy
An Overview of Computer Security and Privacy
Protecting Your Computer and Your Data
Protecting Yourself and Your Family from Security Threats
Keeping Your Computer Secure and Updated
Computer Ethics
Module Summary
Course Overview
Course Information

This course gives you an overview of computer privacy and security. You learn about the types of threats
to your computer, and how to protect your computer from these threats. You also learn about the ethical
challenges that the computer and the Internet present, along with the legal concerns of information

Course Details and Description
Audience Description
This course is intended for anyone who wants to acquire digital literacy skills.

Students should have basic reading comprehension skills at the level required to read a local newspaper.
Students should have completed the first course on Computer Basics, or have equivalent computer skills.

Course Objectives
After completing this course, you will be able to:
Explain the primary risks to both hardware and data from accident, device failure, the environment,
human error, and malicious acts.
Take steps to minimize such risks.
For More Information
For more information, see the Microsoft Learning Web site.
Computer Security and Privacy
Module Introduction

Like any other electronic device, your computer is at risk from damages caused by accident or by
intention. Some of these damages can be permanent. You can prevent your computer hardware,
software, and the data stored on it from a number of damages by taking certain preventive measures.

This module helps you to identify the various threats to your computer and the data stored on it. You will explore how to protect your computer from these threats by taking some preventive measures. Finally, the module explains the ethical and legal issues related to Internet usage.

Module Objectives
After completing this module, you will be able to:
Explain the terms security and privacy, and identify the forms and possible effects of different
categories of computer threats.
Identify the various methods of protecting your computer and your data from threats.
Explain the good working habits used to enhance computer security and privacy.
Explain the purpose of different security settings on your computer and the options available for
keeping your computer up-to-date.
Identify the basic ethical challenges that the computer and the Internet present to all users.
(Study Sheet for this module.)

Study Sheet
Lesson 1
An Overview of Computer Security and Privacy

Introduction to Computer Security and Privacy
Introducing Computer Threats and Solutions
Sort Game: Computer Threats and Solutions
Self Test
Lesson 2
Protecting Your Computer and your Data
Protecting the Operating Environment and the Data on Your Computer
Securing Online and Network Transactions
Ensuring E-Mail and Instant Messaging Security
Sort Game: Measures to Protect Your Computer and Your Data
Self Test
Lesson 3
Protecting Yourself and Your Family from Security Threats
Protecting Privacy
Online Predators
Guidelines to Protect Yourself and Your Family from Online Predators
Tile Game: Protecting Your Family from Online Predators
Self Test
Lesson 4
Keeping Your Computer Secure and Updated
Configuring the Computer Security Settings
Keeping the Computer Up-to-Date
Self Test
Lesson 5
Computer Ethics
About Intellectual Property
Copyright Violation and Prevention
Legal Concerns with Information Exchange
Tile Game: Understanding Computer Ethics
Self Test

Lesson 1

\u221aIntroduction to Computer Security and Privacy
\u221aIntroducing Computer Threats and Solutions
\u221aSort Game: Computer Threats and Solutions
\u221aSelf Test
You store your important documents, such as your tax papers, securely so that they are not damaged or
lost. You also ensure that no one has access to them without your permission.

If you use computers regularly, you may have a lot of information stored on the computer. This
information may be in form of tax details, personal letters, or business correspondence. You need to
ensure that this information is not viewed by other people without your permission. You also need to
protect this information from getting damaged.

In this lesson, you will explore the need for protecting your computer hardware, software, and electronic data from damage, loss, and theft. You will also learn about the various solutions and devices that you can use to protect the data on your computer.

Lesson Objectives:
After completing this lesson, you will be able to:
Explain what the terms security and privacy mean as they apply to computing.
Identify the various threats prevalent in the world of computers and the corresponding

Any factor that can damage your computer or the data on it is a computer threat. There are different
types of computer threats. Natural events such earthquakes or hurricanes can cause widespread physical
damage. It is possible that you or someone else accidentally deletes some important files causing the
computer to malfunction. When your computer is connected to a network, the computer becomes even
more vulnerable to computer threats. For example, another user may use the network to gain authorized
access to your computer.

There are various measures that you can use to reduce the likelihood of loss due to damage. For
example, you can restrict the access to your computer and create backups of important data, which you
can use if the data is deleted or tampered with. By following basic guidelines, you can minimize the risks
of damage to your computer and ensure its security and privacy.

Computer Security

The computer hardware can be damaged due to human carelessness or natural causes such as
earthquakes, floods, and hurricanes. Also, the data and software on the computer need to be protected
from accidental or intentional loss and tampering. Computer security deals with the measures that you
can take to avoid such damage to the computer and its data.

Computer Privacy

You store your personal files or documents on your computer and would not want anyone to read them.
Computer privacy means that your data, such as personal files and e-mail message, is not accessible by
anyone without your permission. Computer privacy deals with the measures that you can take to restrict
access to your data. Computer privacy also includes being careful while giving out any personal
information over the Internet. Any such information is likely to be misused to gain access to your
personal accounts, such as your e-mail and bank accounts.

There are various threats to your computers and the data stored on it. For example, someone may try to
steal your computer hardware. Some components of your computer can get damaged due to excessive

heat or cold. You can categorize these threats into three main categories:
1. environmental or natural threats
2. malicious human threats
3. non-malicious human threats

The following table lists the various threats to computer security and privacy. It also explains the
measures that you can take to protect your data and computer from these threats.

Activity (8)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Julimar_07 liked this
mylecture liked this
dsevent liked this
Rohit Sam liked this
meadowlundz liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->