GRADE 8 PRE- TECHNICAL STUDIES RATIONALIZED LESSON NOTES
STRAND 1: FOUNDATION OF COMPUTER SCIENCE
1.1 FIRE AND DATA SAFETY
Data threats in a computer.
i. Data safety-it is protecting digital data from lose through safe storage
and backing up.
ii. Data privacy-is protecting personal information from unauthorized
access.
It is also the ability of people to determine who can access their personal data.
iii. Data threats- are any potential dangers to information stored in an
electronic device or computer system. They include actions that may be
internal or external and that may cause stealing, destruction, denying access
to or loss of data.
Data safety, privacy, and threats are crucial considerations in today's digital age.
Here are some key points related to these topics:
Data Safety:
1. Encryption: Use encryption to protect data in transit and at rest. This
includes end-to-end encryption for messaging and communication.
2. Access Control: Implement access controls to limit who can view or modify
sensitive data. This includes role-based access control, multi-factor
authentication, and least privilege access.
3. Data Backup: Regularly back up data to prevent loss in case of a security
breach or hardware failure.
4. Secure Network Configuration: Ensure network devices are configured
securely, including firewalls, routers, and switches.
Data Privacy:
1. Transparency: Be transparent about what data is being collected, how it's
used, and with whom it's shared.
2. Consent: Obtain explicit consent from users before collecting their personal
data.
3. Data Minimization: Collect only the data necessary for a specific purpose.
4. Data Anonymization: Anonymize data to protect individual identities.
Threats:
1. Phishing: Be cautious of phishing scams that can lead to identity theft or
malware infection.
2. Malware: Install anti-virus software and keep it up-to-date to prevent
malware infections.
3. Ransomware: Regularly back up data and use robust security measures to
prevent ransomware attacks.
4. Social Engineering: Be aware of social engineering tactics, such as pretexting,
baiting, and quid pro quo.
Best Practices:
1. Use strong passwords and multi-factor authentication.
2. Keep software and systems up-to-date with the latest security patches.
3. Use a virtual private network (VPN) when accessing public Wi-Fi networks.
4. Monitor accounts and credit reports for suspicious activity.
By prioritizing data safety, privacy, and threats, you can significantly reduce the
risk of security breaches and protect sensitive information
Data threats are commonly caused by:
Hackers.
Malware or virus attacks.
Fraudsters.
Thieves.
Human errors.
Unauthorized access to files.
Malicious access to system functions by unauthorized persons.
Here are some common data threats:
Phishing: Phishing attacks involve sending fake emails, texts, or messages that
appear to be from a trustworthy source, attempting to trick users into revealing
sensitive information such as passwords or credit card numbers.
Malware: Malware is short for malicious software. It includes viruses, trojans,
spyware, and ransomware. These types of malware can cause harm by deleting
your files, slowing down your computer, tracking your online activity, or locking
your screen to demand a ransom.
Ransomware: Ransomware is a type of malware that encrypts your files and
demands that you pay a ransom to receive the decryption key.
SQL Injection: SQL injection is a type of attack that occurs when an attacker injects
malicious SQL code into a web application, allowing them to extract sensitive
information from the database or modify it.
Cross-Site Scripting (XSS): XSS is an attack that occurs when an attacker injects
malicious JavaScript code into a website, allowing them to steal user information
or gain administrative privileges.
Man-in-the-Middle (MitM) Attack: A MitM attack occurs when an attacker
intercepts communication between two parties, allowing them to steal sensitive
information or inject malware into the communication stream.
Unsecured Wireless Networks: Unsecured wireless networks can be easily
intercepted and used to steal sensitive information or inject malware into the
network.
Data Breaches: Data breaches occur when sensitive information is stolen or
compromised due to a security vulnerability or poor data protection practices.
Insider Threats: Insider threats occur when an authorized user intentionally or
unintentionally compromises the security of the system, often due to a mistake,
malicious intent, or lack of training.
Social Engineering: Social engineering involves manipulating users into revealing
sensitive information or performing certain actions that compromise the security
of the system.
Zero-Day Exploit: A zero-day exploit is an attack that targets a previously unknown
vulnerability in a software or system, often allowing the attacker to gain control or
extract sensitive information.
Denial of Service (DoS) Attack: A DoS attack occurs when an attacker overwhelms a
system with traffic, causing it to become unavailable to legitimate users.
Buffer Overflow: A buffer overflow occurs when an attacker overflows a buffer
with more data than it can handle, allowing them to execute malicious code and
gain control of the system.
Cross-Site Request Forgery (CSRF): CSRF is an attack that occurs when an attacker
tricks a user into performing certain actions on a web application without their
knowledge or consent.
Session Hijacking: Session hijacking occurs when an attacker intercepts a user's
session ID and uses it to gain access to the user's account or sensitive information.
These are just a few common data threats, and it's essential to stay informed
about the latest threats and vulnerabilities to protect data and systems.
Way or measures for securing data in an electronic device such as
computer.
Securing data on electronic devices like computers is crucial to protect against
unauthorized access, data breaches, and other cybersecurity threats. Here are
some effective measures and practices for safeguarding data:
1. Use Strong Passwords
Create complex, unique passwords for different accounts.
Use a combination of uppercase and lowercase letters, numbers, and special
characters.
Change passwords regularly and avoid using easily guessable information.
2. Enable Multi-Factor Authentication (MFA)
Use MFA wherever possible to add an extra layer of security. This typically
involves a second form of verification such as a text message, email, or
authentication app.
3. Install Security Software
Use reputable antivirus and anti-malware software.
Keep security software up to date to protect against new threats.
4. Regularly Update Software
Keep your operating system, applications, and drivers up to date to fix
vulnerabilities and improve security.
5. Use Firewalls
Configure your computer's built-in firewall and consider using a hardware
firewall for an additional layer of protection.
6. Encrypt Sensitive Data
Use encryption tools to protect sensitive data. Encrypt files, folders, and
external storage devices to make data unreadable without proper
authorization.
7. Backup Data Regularly
Implement regular data backup practices. Store backups in a secure cloud
service or an external hard drive.
Ensure that backups are also encrypted.
8. Be Cautious with Public Wi-Fi
Avoid accessing sensitive information over unsecured public Wi-Fi networks.
Use a Virtual Private Network
Control What the measure
(VPN) to encrypt internet traffic
measure protects the data
when using public Wi-Fi.
against
9. Practice Safe Browsing Habits
Avoid clicking on suspicious links or
Backing up Protects data from
downloading unknown data complete loss.
attachments from emails. Installing Protects the data from
Use web browsers with built-in
antivirus corruption and loss.
security features and ad blockers. software
10. Configure Privacy Settings Using strong Protects data from
Adjust privacy settings on
passwords unauthorised access.
applications and services to limit data sharing.
Disable location services and other features that are not necessary.
11. Be Aware of Phishing Attempts
Educate yourself on identifying phishing attempts through emails and
messages.
Always verify the source before entering personal information online.
12. Physical Security Measures
Physically secure your device by keeping it in a safe place.
Use cable locks for laptops in public spaces and consider screen privacy
filters.
13. Disable Unnecessary Services
Disable unnecessary services, features, or applications, especially those that
are not in use, to reduce potential vulnerabilities.
14. Log Out of Sessions
Log out of accounts when finished, especially on shared or public computers.
Clear browsing history and cache regularly.
15. Monitor for Suspicious Activity
Regularly check for unauthorized access or unusual activity on your device
and accounts.
Enable alerts for suspicious login attempts.
By implementing these security measures, you can significantly enhance the
protection of your data stored on electronic devices, safeguarding it against a wide
range of threats.
Installation of antivirus software-helps to detect and delete malicious
computer programs or virus that destroys data.
Backing up data – data can be retrieved after creating a copy of the
data on your system which you can use for recovery in case original data is
lost or corrupted.
Use of strong passwords -strong passwords prevents unauthorised
access to data stored in electronic devices.
Regularly changing passwords.
Limiting personal information to share.