Professional Documents
Culture Documents
WEEK 4 Presentation2 COMPUTER LITERACY
WEEK 4 Presentation2 COMPUTER LITERACY
WEEK 4 Presentation2 COMPUTER LITERACY
SECURITY
SYSTEM VULNERABILITIES AND RISK
SYSTEM VULNERABILITIES AND RISK
u This simply refer to the flaws of the computer hardware, software and other procedure
that can be compromised by attackers concerning the security of a system. These risk
can exist in some part of the system like the operating system, network protocols,
applications and system files etc.
Hacking Is referred to the act of exploring and experimenting with computer systems, often
driven by curiosity and a desire to understand how systems work. However, over time, the
term has become associated with unauthorized access to computer systems, networks, and
data for malicious purposes. There are two types of hackers namely;
Ethical Hacker
Also known as white hat hacking involves security professionals who use their skills to
identify and fix vulnerabilities in systems. White hat hackers may be hired by organizations to
conduct penetration testing and security assessments to improve the overall security
posture. One of the major programs to pursue this career is called cyber security and system
administration. The minimum salary for such a job is $70,000 to $120,000 per year.
SYSTEM VULNERABILITIES AND RISK
NON-ETHICAL HACKERS
This refers to hacking done with malicious intent. Black hat hackers exploit vulnerabilities in
computer systems to steal data, disrupt services, or gain unauthorized access for personal
gain or to cause harm. These hackers are prone to arrest by federal law. Black hackers defect
Systems and ask for huge ransom and this I how they make money. Others also tend to use
their skills to steal information or data for personal consents. Every country has a law that
punishes these people when caught.
PASSWORD ATTACKS
u "Backup" refers to the process of creating copies of data or files to protect against data
loss in case of accidental deletion, hardware failure, data corruption, or other disasters.
Backups are essential for ensuring the availability and integrity of important information.
FIREWALL
u A firewall is a network security device or software that monitors and controls incoming
and outgoing network traffic based on predetermined security rules. It acts as a barrier
between a trusted internal network and untrusted external networks, such as the
internet, to prevent unauthorized access, data leakage, and other malicious activities.
ENCRYPTION