Search Header Logo
 Computer security and cyber security

Computer security and cyber security

Assessment

Presentation

Computers

10th - 12th Grade

Practice Problem

Easy

Created by

Melissa Philips

Used 5+ times

FREE Resource

12 Slides • 7 Questions

1

media
media

Implications & Misuse of
Cybersecurity

2

media
media

Your Logo or Name Here

Objectives

Describe measures to secure data and

maintain data integrity.

Outline ways by which information can be

misused.

2

3

media
media

Computer crimes such as hacking,
Internet fraud, Industrial espionage
and software piracy have increased the
need for Computer security.

This Photo by Unknown Author is licensed under CC

BY-ND

4

media

Your Logo or Name Here

A security threat attempts to take advantage of a vulnerability
or weakness in a system or its data. It indicates a possible
danger to one or more computer systems, or by extension a
network.

Security Threats

4

5

media

Your Logo or Name Here

Computer security refers to the protection of hardware and
software resources against their accidental or deliberate
damages, theft or corruption(in the case of software).

Computer Security

5

6

media

Your Logo or Name Here

Data security refers to the physical, hardware and software
methods used to protect data from unauthorized access and
corruption. Data security ensures that data integrity is
maintained.

Data Security

6

7

Multiple Choice

he accuracy, reliability and consistency of data

1

Data integrity

2

Data security

3

Data archiving

4

Data entry

8

Multiple Choice

What is a security threat in the context of computer systems?

1

A potential danger that tries to exploit a vulnerability or weakness in a system or its data, potentially harming one or more computer systems or a network.

2

The process of fixing vulnerabilities in a system to improve its security

3

The ability of a system to recover from an attack or failure and continue functioning.

4

A mechanism to prevent all potential security issues in a computer system.

9

Multiple Choice



What does computer security aim to protect?

1

A) It aims to protect physical hardware from accidental damage.

2

B) It aims to protect software from being deleted accidentally.

3

C) It aims to protect both hardware and software from accidental or deliberate damage, theft, or corruption.

4

D) Only hardware from theft or corruption.

10

Multiple Choice

Measures that are put in place to ensure data is safe is referred to as

1

Data integrity

2

Data security.

3

Data protection

4

Data autorization

11

media
media

Computer Users

Represents the greatest threat to a
company’s computer security system.

12

media
media
media
media
media
media

Your Logo or Name Here

Data Security can be compromised in several ways:

Human Error

Natural Disaster

Worms & Viruses

Hardware

Malfunction

Fraud

8

13

media

Your Logo or Name Here

This is a weakness or flaw in one or more computer
systems, or connectivity to computer systems.

This weakness can be used to gain access and even
damage the system or its data.

Computer Vulnerability

9

14

media

Your Logo or Name Here

Vulnerabilities are classified as:

I Internal
II External

Computer Vulnerability

10

15

media

Your Logo or Name Here

Vulnerabilities

Errors by employees who

overwrite or erase the data.

No backup procedure in

place for data files.

Hardware or software not

being kept in locked rooms

or passwords not created to

access software.

Internal Vulnerabilities

Lack of anti-virus program

to scan email attachments for

viruses.

Former employees whose

password and security

information has not been

removed from the system.

Internally produced

software( proprietary

software) which may

be flawed and may as

a result damage data.

Employee who
attempt to
fraudulently obtain
money using the
company name

11

16

media

Your Logo or Name Here

Vulnerabilities

Minimal or no protection of

computer systems and their

data from natural disasters.

For e.g, floods, hurricanes,

earthquakes, volcanoes and

other natural phenomena.

External Vulnerabilities

Lack of protection form
electrical power surges and
spikes that could damage
computer hardware, software
and stored data files.

Terrorist activities

that target buildings

or rooms with

computer systems .

For e.g, bombing,

arsons.

12

17

Open Ended

List three man-made ways in which data can be compromised.

18

Open Ended

Computer vulnerability can be classified into _______ and _________

19

Categorize

Options (5)

Lack of anti-virus program to scan email attachments for viruses.

Former employees whose password and security information has not been removed from the system.

Employee who attempt to fraudulently obtain money using the company name

  • Lack of protection form electrical power surges and spikes that could damage computer hardware,

Minimal or no protection of computer systems and their data from natural disasters.

Organize these options into the right categories

Internal vulnerabilities
External vulnerabilities
media
media

Implications & Misuse of
Cybersecurity

Show answer

Auto Play

Slide 1 / 19

SLIDE