You are on page 1of 1
coiteaseeute Computer ret Inerocuction to oat Seurty Module Summary "Data is any piece of information about an object or entity 1 Information is nothing but processed data ™ Personal infarmation is used by attackers to cause financial, emotional, and physical damage-to users "If data belonging to commercial entities are leaked, it could wreak havoc on them = Commercial data breaches have much more implications than just the obvious financial one "Computer security is the protection of computing systems and the data they store or access = Confidentiality, integrity, non-repudiation, authenticity, and availability are the elements of security ™ Security risks to home users arise from various computer attacks and accidents causing physical damage to computer systems "Potential losses due to security attacks—finandial losses, unavailability of resources, identity theft, loss of trust, data theft, and misuse of computer resources "Precaution, maintenance, and reaction are the steps involved in securing a computer from threats Discussion Questions 1. Harold was using an ATM, as he needed to withdraw some money to pay for his classes. When he swiped his card atthe machine, and proceeded to enter his pin, Harold noticed that another man behind him was trying to peek over his shoulder while he was entering his PIN. What should Harold do in this situation? 2. Incase of a suspected data breach, what course of action should a person take? 3. When you buy 2 new laptop or a tablet, what are the different security measures you can take to keep the data on the device secure? cee Pages Certo secure Computer User Cexyrent ©) EE-DRUNEL ‘Aight Rarevea Raprocucion str Proninkes

You might also like