You are on page 1of 2

AIS160

FUNDAMENTALS OF INFORMATION TECHNOLOGY

LAB EXERCISE: WORD PROCESSING SOFTWARE

Refer to Microsoft Office Training Series Manual

Instructions:

Retype and edit the article given based on the following requirements.

 Layout: Normal margin


 Header (stating your full name; Arial, font size 9)
 Title of article (Capitalize each word, Bold, Arial, Font size 22, Center)
 Content (Split text into two columns, Sentence case, Arial, font size 11, justify, 1.15
spacing)
o Insert drop cap 2 lines for the first letter C
o Create the table, font Calibri size 11
o Use table design style Grid Table 4 – Accent 2.
o Insert appropriate picture and word art for “Cyber Security” text.
 References: All references must meet the APA style and using in text citation.
 Footer (Page number, Arial, font size 9)
 Create the watermark – AIS160
 Save the edited article as Microsoft Word .doc format and name your file as YOUR
NAME.
 Upload the file in UFUTURE: Lab Work- MsWord.
Musmailina Mustafa Kamal

COMPUTER
SECURITY

C omputer security, also known as


cybersecurity or IT security, is the
protection of information systems
hardware, as well as protecting against harm
that may come via network access, data and
code injection, and due to malpractice by
from theft or damage to the hardware, the operators, whether intentional, accidental, or
software, and to the information on them, as due to them being tricked into deviating from
well as from disruption or misdirection of the secure procedures.
services they provide. It includes controlling
physical access to the

Computer Security is concerned with four main areas:


1. Confidentiality:- Only authorized users can access the data resources and information.
2. Integrity:- Only authorized users should be able to modify the data when needed.
3. Availability:- Data should be available to users when needed.
4. Authentication:- are you really communicating with whom you think you are communicating
with

Why is computer security important?

Prevention of data theft such as bank account is necessary to protect your computer and
numbers, credit card information, passwords, hence the need for Computer Security arises.
work related documents or sheets, etc. is
essential in today’s communications since
many of our day to day actions depend on the
security of the data paths.

Data present in a computer can also be


misused by unauthorized intrusions. An
intruder can modify and change the program
source codes and can also use your pictures or
email accounts to create derogatory content
such as pornographic images, fake misleading
and offensive social accounts.
References
Malicious intents can also be a factor in
Arief Ramadhan, D. I. (2011). A Synergy of
computer security. Intruders often use your
Computer Ethics. International
computers for attacking other computers or
Journal of Advanced Computer
websites or networks for creating havoc.
Science and Application, 200-300.
Vengeful hackers might crash someone’s
computer system to create data loss. DDOS R., B. I. (February, 2009). Literacy of Cyber
attacks can be made to prevent access to Safety, Digital Awareness. Social
websites by crashing the server. Education, pp. 61-65.

Above factors imply that your data should


remain safe and confidential. Therefore, it

You might also like