Computer Security Written Task
Name: [Your Name]
Course: [Course Name]
Date: [Date]
I. Define & Identify
Instructions: Define the following computer security terms in your own words and provide
one real-life example for each.
Malware
Definition: Malware is a type of software specifically designed to harm or exploit devices,
networks, or data.
Real-Life Example: Example: A student downloads a free game from an untrusted website
that secretly installs a keylogger on their computer.
Phishing
Definition: Phishing is a cyberattack where fake messages trick people into giving away
sensitive information like passwords or credit card numbers.
Real-Life Example: Example: Receiving an email pretending to be from a bank asking you to
verify your account by entering your login details.
Firewall
Definition: A firewall is a security system that controls incoming and outgoing network
traffic based on predetermined rules.
Real-Life Example: Example: The school network uses a firewall to block access to harmful
or inappropriate websites.
Antivirus
Definition: Antivirus is a program that detects and removes malicious software from a
computer.
Real-Life Example: Example: Installing antivirus software like Avast or Windows Defender
to scan for and remove viruses on your laptop.
Password Cracking
Definition: Password cracking is the act of guessing or recovering passwords using various
methods like brute force or dictionary attacks.
Real-Life Example: Example: A hacker uses a tool to repeatedly try different password
combinations to access a user’s email account.
Two-Factor Authentication (2FA)
Definition: 2FA is a security method that requires two forms of identification before giving
access to an account or system.
Real-Life Example: Example: When logging in to Facebook, after entering your password,
you also need to enter a code sent to your phone.
II. Scenario-Based Questions
Scenario A: The USB Trap
1. The security mistake was plugging in an unknown USB device without scanning it for
malware.
2. The student should have reported the USB to a teacher or IT personnel instead of using it.
3. Schools can protect their network by disabling USB ports, using endpoint protection
software, and educating students about cybersecurity risks.
Scenario B: Social Media Overshare
1. This was a phishing attack, tricking the user into giving away their login credentials.
2. It could have been prevented by verifying the legitimacy of the message and not clicking
suspicious links.
3. After being hacked, you should immediately change your password, enable 2FA, and
inform the platform about the breach.
Scenario C: The Weak Password
1. Weak passwords are easy to guess and can allow unauthorized access to sensitive
information.
2. The system should require strong passwords that include uppercase, lowercase,
numbers, and symbols, and be at least 8 characters long.
3. Computer security helps protect sensitive school data like grades and personal
information from being tampered with or stolen.
III. Reflection
I’ve learned that computer security is essential in protecting myself both online and offline.
In my everyday life, I can apply basic practices like creating strong passwords, enabling
two-factor authentication, and not clicking on suspicious links. Regularly updating my
devices and using antivirus software can also keep me safe from threats. It's also important
to back up data and avoid connecting to unknown networks. By being more aware and
cautious, I can protect my devices, personal data, and online identity from being
compromised. These practices are not just for IT professionals—they are habits every
internet user should develop.