COMPUTER SECURITY AND PRIVACY
Computer Security and Privacy
Your computer is a very valuable and important device and you might depend on it for many things that
you do throughout the day. Also, you might use computers for storing personal or official information,
which you cannot afford to lose. However, your computer and the data stored on it are vulnerable to
damage and destruction. Therefore, it is essential that you take some protective measures to keep your
computer secure and updated.
This course gives you an overview of computer privacy and security. You learn about the types of threats
to your computer, and how to protect your computer from these threats. You also learn about the ethical
challenges that the computer and the Internet present, along with the legal concerns of information
Students should have basic reading comprehension skills at the level required to read a local newspaper.
Students should have completed the first course on Computer Basics, or have equivalent computer skills.
Like any other electronic device, your computer is at risk from damages caused by accident or by
intention. Some of these damages can be permanent. You can prevent your computer hardware,
software, and the data stored on it from a number of damages by taking certain preventive measures.
This module helps you to identify the various threats to your computer and the data stored on it. You will explore how to protect your computer from these threats by taking some preventive measures. Finally, the module explains the ethical and legal issues related to Internet usage.
COMPUTER SECURITY AND PRIVACY
An Overview of Computer Security and Privacy
AN OVERVIEW OF COMPUTER SECURITY AND PRIVACY
If you use computers regularly, you may have a lot of information stored on the computer. This
information may be in form of tax details, personal letters, or business correspondence. You need to
ensure that this information is not viewed by other people without your permission. You also need to
protect this information from getting damaged.
In this lesson, you will explore the need for protecting your computer hardware, software, and electronic data from damage, loss, and theft. You will also learn about the various solutions and devices that you can use to protect the data on your computer.
Any factor that can damage your computer or the data on it is a computer threat. There are different
types of computer threats. Natural events such earthquakes or hurricanes can cause widespread physical
damage. It is possible that you or someone else accidentally deletes some important files causing the
computer to malfunction. When your computer is connected to a network, the computer becomes even
more vulnerable to computer threats. For example, another user may use the network to gain authorized
access to your computer.
There are various measures that you can use to reduce the likelihood of loss due to damage. For
example, you can restrict the access to your computer and create backups of important data, which you
can use if the data is deleted or tampered with. By following basic guidelines, you can minimize the risks
of damage to your computer and ensure its security and privacy.
The computer hardware can be damaged due to human carelessness or natural causes such as
earthquakes, floods, and hurricanes. Also, the data and software on the computer need to be protected
from accidental or intentional loss and tampering. Computer security deals with the measures that you
can take to avoid such damage to the computer and its data.
You store your personal files or documents on your computer and would not want anyone to read them.
Computer privacy means that your data, such as personal files and e-mail message, is not accessible by
anyone without your permission. Computer privacy deals with the measures that you can take to restrict
access to your data. Computer privacy also includes being careful while giving out any personal
information over the Internet. Any such information is likely to be misused to gain access to your
personal accounts, such as your e-mail and bank accounts.
heat or cold. You can categorize these threats into three main categories:
1. environmental or natural threats
2. malicious human threats
3. non-malicious human threats
This action might not be possible to undo. Are you sure you want to continue?