System and Data Security – Senior 4 ICT Notes, Learning Outcomes & Activities

Introduction

Modern computer systems handle sensitive data and connect to vast networks — making them vulnerable to risks like viruses, hackers, data theft, and unauthorized access. To protect this information, users must apply strong security practices and tools.

This topic helps learners understand key threats, explore how to protect systems using hardware and software solutions, and develop ethical digital behaviour — both in personal and institutional ICT environments.

What Is Computer Security?

Computer security refers to the protection of systems, programs, and data from unauthorized access, damage, or theft. It involves:

  • Using secure passwords

  • Installing antivirus software

  • Applying firewalls and encryption

  • Practicing safe browsing and file sharing

  • Avoiding malicious websites or emails


Learning Outcomes

By the end of this topic, learners should be able to:


a) Explain the Concept of Computer Security

Learners should understand the importance of protecting digital systems and recognize the consequences of poor security.

Key Concepts & Examples:

  • Malware – Malicious programs like viruses, worms, and spyware.

  • Phishing – Fraudulent emails tricking users into giving up sensitive info.

  • Hacking – Unauthorized system access.

  • Data breaches – Personal or sensitive data is leaked or stolen.

  • Effects – Slowed systems, lost files, financial loss, or reputational harm.


b) Secure Computer Systems Against Attacks

Learners must explore tools and techniques used to protect systems at home, school, or work.

 Security Tools & Methods:

  • Antivirus software – Scans and removes malicious programs.

  • Firewalls – Block unwanted network traffic.

  • Strong passwords – Using symbols, numbers, and mixed-case letters.

  • Encryption – Secures data during transfer or storage.

  • Biometrics – Facial or fingerprint recognition for login security.

Also includes: Honeypots (decoy systems), intrusion detection systems, and safe network practices like turning off file sharing when not needed.


c) Describe Ethical Practices While Using ICTs

Learners should understand the importance of using digital tools responsibly and respectfully.

Ethical Behaviour in ICT:

  • Respect privacy – Don’t access or share other people’s files without permission.

  • Avoid cyberbullying – Use communication platforms respectfully.

  • No piracy – Don’t install or share pirated software or media.

  • Follow school ICT rules – Use school devices as instructed.

  • Create/obey a Code of Conduct – Clear rules on responsible digital use.


Suggested Learning Activities

Here are practical classroom activities aligned with the outcomes above:


1. Discuss Computer Security Risks

  • Learners share examples like infected flash disks or hacked school accounts.

  • Class brainstorm: “What are signs that a computer has been attacked?”


2. Research Impact of Attacks

  • Students present short stories on ransomware or phishing attacks.

  • Example: “How a fake email tricked someone into revealing passwords.”


3. Identify Malware-Infected Systems

  • Use real or demo scenarios:

    • Slow startup

    • Random pop-ups

    • Disabled antivirus

    • Missing files

    • Crashing applications


4. Explore Security Technologies

  • Small groups research tools such as:

    • Firewalls (Windows Defender Firewall)

    • Antivirus apps (Avast, Kaspersky)

    • Biometric devices (fingerprint readers)

    • Password vaults (Bitwarden, KeePass)

    • Network monitoring tools (Wireshark basics)


5. Write a Security Report

  • Learners prepare a 1-page report titled:
    “How to Secure a School Computer Lab”
    Include 5–6 recommendations and tools.


6. Simulate Securing a System

  • Practice:

    • Changing default passwords

    • Running an antivirus scan

    • Enabling a firewall

    • Turning off file sharing


7. Discuss ICT Ethics

  • Class builds a shared “Code of Conduct” poster for the school lab.

  • Include:

    • No social media during lessons

    • No altering system settings

    • No installing personal software