Introduction
Modern computer systems handle sensitive data and connect to vast networks — making them vulnerable to risks like viruses, hackers, data theft, and unauthorized access. To protect this information, users must apply strong security practices and tools.
This topic helps learners understand key threats, explore how to protect systems using hardware and software solutions, and develop ethical digital behaviour — both in personal and institutional ICT environments.
What Is Computer Security?
Computer security refers to the protection of systems, programs, and data from unauthorized access, damage, or theft. It involves:
Using secure passwords
Installing antivirus software
Applying firewalls and encryption
Practicing safe browsing and file sharing
Avoiding malicious websites or emails
Learning Outcomes
By the end of this topic, learners should be able to:
a) Explain the Concept of Computer Security
Learners should understand the importance of protecting digital systems and recognize the consequences of poor security.
Key Concepts & Examples:
Malware – Malicious programs like viruses, worms, and spyware.
Phishing – Fraudulent emails tricking users into giving up sensitive info.
Hacking – Unauthorized system access.
Data breaches – Personal or sensitive data is leaked or stolen.
Effects – Slowed systems, lost files, financial loss, or reputational harm.
b) Secure Computer Systems Against Attacks
Learners must explore tools and techniques used to protect systems at home, school, or work.
Security Tools & Methods:
Antivirus software – Scans and removes malicious programs.
Firewalls – Block unwanted network traffic.
Strong passwords – Using symbols, numbers, and mixed-case letters.
Encryption – Secures data during transfer or storage.
Biometrics – Facial or fingerprint recognition for login security.
Also includes: Honeypots (decoy systems), intrusion detection systems, and safe network practices like turning off file sharing when not needed.
c) Describe Ethical Practices While Using ICTs
Learners should understand the importance of using digital tools responsibly and respectfully.
Ethical Behaviour in ICT:
Respect privacy – Don’t access or share other people’s files without permission.
Avoid cyberbullying – Use communication platforms respectfully.
No piracy – Don’t install or share pirated software or media.
Follow school ICT rules – Use school devices as instructed.
Create/obey a Code of Conduct – Clear rules on responsible digital use.
Suggested Learning Activities
Here are practical classroom activities aligned with the outcomes above:
1. Discuss Computer Security Risks
Learners share examples like infected flash disks or hacked school accounts.
Class brainstorm: “What are signs that a computer has been attacked?”
2. Research Impact of Attacks
Students present short stories on ransomware or phishing attacks.
Example: “How a fake email tricked someone into revealing passwords.”
3. Identify Malware-Infected Systems
Use real or demo scenarios:
Slow startup
Random pop-ups
Disabled antivirus
Missing files
Crashing applications
4. Explore Security Technologies
Small groups research tools such as:
Firewalls (Windows Defender Firewall)
Antivirus apps (Avast, Kaspersky)
Biometric devices (fingerprint readers)
Password vaults (Bitwarden, KeePass)
Network monitoring tools (Wireshark basics)
5. Write a Security Report
Learners prepare a 1-page report titled:
“How to Secure a School Computer Lab”
Include 5–6 recommendations and tools.
6. Simulate Securing a System
Practice:
Changing default passwords
Running an antivirus scan
Enabling a firewall
Turning off file sharing
7. Discuss ICT Ethics
Class builds a shared “Code of Conduct” poster for the school lab.
Include:
No social media during lessons
No altering system settings
No installing personal software