0% found this document useful (0 votes)
25 views6 pages

ITC Midterms

Uploaded by

chaylezf03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views6 pages

ITC Midterms

Uploaded by

chaylezf03
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

MODULE 4 - DIGITAL SECURITY Insider Threats - threats from inside an

ETHICS AND PRIVACY: THREATS, organization


ISSUES, AND DEFENSES ● Conduct security awareness
training
Digital Security Risks - solely technical ● Implement role-based access
risk stemming from cyber incidents control
Zero-Day Exploits - exploits unknown
Internet and network attacks can take vulnerabilities in software or hardware
many forms, targeting individuals, ● Regularly updates software and
systems, or entire networks firmware
● Use intrusion detection systems
Types: (IDS)
Rogue-Access Points - unauthorized wi-
Malware - spyware that harms or gains fi network set up to capture user data
unauthorized access ● Avoid public Wifi without VPN
● Use antivirus software ● Use WPA3 encryption
● Install firewalls
Phishing -Impersonation to steal Unauthorized Access and Use - gaining
sensitive information entry into a system or network without
● Use email filters permission
● Enable 2FA
Denial of Service - Overloads a system Software theft - illegal copying or use of
● Implement traffic filtering software without proper licensing or
● Use DDoS protection services permission
Man-in-the-Middle - Interception of
communication between two parties Information Theft - stealing sensitive or
without their knowledge confidential data
● Use encryption
● Employ VPN Hardware Theft - physical theft of
SOL Injection - Inject Sol queries to computers, mobile devices etc.
manipulate databases
● Sanitize input Vandalism - deliberate destruction or
● Implement WAFs damage to hardware, networks, or data
Password Attacks - guessing or system
cracking of passwords
● Use strong passwords Failure to Back Up - not maintaining
● Enable two factor authentication proper copies of important data leading
Cross-Site-Scripting(XSS) - injection of to data loss
malicious scripts into website
● Sanitize Input Wireless Security - designed to protect
● Implement CSPs wireless networks from unauthorized
access, data breach and other forms of ○ SSDs are faster than
cyberattack traditional HDDs.
● Cooling System
Information Privacy - protection of ○ Used to dissipate heat
personal or sensitive data from generated by components
unauthorized access, use or disclosure ● Graphics Processing Unit (GPU)
○ Handles rendering of
Data Privacy Act of 2012 (RA 10173) - images, video, and
protect the privacy of an individual while animations
ensuring the free flow of information

Role of National Privacy Commission ● Optical Drives


(NPC) - responsible for enforcing the ○ Allow for reading and
Data Privacy Act writing to optical discs
● Expansion Cards
○ Add additional features to
MODULE 5 - COMPUTING the system
COMPONENT: PROCESSORS, ● Input/Output Ports
MEMORY, THE CLOUD AND MORE ○ Connectors on the back or
front of the system unit
Inside the Case ○ Allow the computer to
interface with external
● Motherboard tools
○ connects and allows ● BIOS/UEFI Chip
communication between ○ Small chip that contains
all components. firmware to initialize
● Central Processing Unit (CPU) hardware components
○ refers as the brain of the ● Cables and Connectors
computer ○ Various cables connect
○ Performs all the components to each other
calculation and processing
task Processor (CPU)
● Random Access Memory (RAM) - Brain of the computer
○ Temporary storage to - Performs most of the processing
store and access data task
● Power Supply Unit (PSU) ● Control Unit (CU)
○ Converts electrical power ○ Managing the execution of
into usable power instructions
● Storage Devices ● Arithmetic Logic Unit (ALU)
○ Used to store operating ○ Performs all arithmetic and
system, software and files, logical operations
● Registers ○ Virtualized computing
○ High-speed storage areas resources
that temporarily hold data ● PaaS (Platform as a Service)
and instructions ○ Development platforms to
TYPES: build and deploy apps
● Single-core ● SaaS (Software as a Service)
○ One processing unit ○ Software applications
● Multi-core accessed online
○ Multiple processing unit
Models:
● Specialized processors ● Public
○ GPUs for rendering ○ Services provided for
images public
○ APU for integrated ● Private
graphics ○ Exclusive for one
BRAND organization
● Intel ● Hybrid
● AMD ○ Combination of both

Cloud computing - delivers computing Data Representation - represented


services over the internet (cloud) rather using binary (0s and 1s)
than local servers of personal devices
● Bit - smallest unit of data
Key Features: ● Byte - group of 8 bits
● On demand resources
○ Access computing power Common Data Types:
and storage anytime ● Integer - Whole numbers
● Scalability ● Character - Represented using
○ Easily scale resources up encoding systems
or down based on needs ● Floating Point - Number with
● Cost Efficiency decimal point
○ Pay only for what you use, ● Boolean - represents true or false
reducing infrastructure
costs Binary Number System - Uses base 2
● Accessibility instead of base 10
○ Access services from Hexadecimal (Base 16) - shorthand for
anywhere with an internet binary using digits 0-9 and letters A-F
connection
Memory - hardware components that
Types of Cloud Services: store data
● IaaS (Infrastructure as a Service)
Types: ● Sound Adapter - Process audio
● Primary Memory (Volatile) input and output
○ RAM - temporary memory ● Storage Adapter - Allows
used by the CPU connection of additional storage
■ DRAM (Dynamic devices
RAm) ● USB Adapter - Expands the
■ SRAM (Static Ram) number of USB ports
○ Cache - small, high-speed PCIe Slots - most adapters connects to
memory located close to the motherboard using PCIe
the CPU Buses - communication system that
● Secondary Memory (Non- transfers data between components
Volatile) inside the computer
○ ROM - memory that stores
firmware and system Types
critical data ● Data Bus - Carries actual data
○ Storage Drives being processed
■ HDD - Traditional ● Address Bus - Transfers
mechanical storage information about the location
■ SSD - Faster, nore ● Control Bus - Transmit control
durable flash signals to manage operations
storage
■ Flash Memory - Common Bus Types
Used in USB, ● Front-Side Bus (FSB) - Connects
memory cards and the CPU to the main memory
SSDs (RAM).
● PCIe Bus - High-speed bus for
connecting expansion cards like
GPUs and network adapters.
● USB Bus - External bus for
connecting peripherals
● SATA Bus - Used to connect
Adapters - allow additional features and storage devices like hard drives
functionalities and SSDs

Types: Power Supply Unit(PSU) - converts AC


● Graphics Adapter - Enhances the from the wall outlet into DC
computer’s ability to render ● Transformers - adjust voltage
image levels
● Network Adapter - Enables a ● Rectifiers - converts AC to DC
computer to connect to a network ● Regulators - Maintain a stable
output voltage
● Wattage - determines the ○ Tablet touch screen - used
maximum power output for drawing or note-taking
● Connectors - provides power to ● Pen Input
various parts ○ Stylus - used with graphic
Types: tablets for digital drawing
● ATX Power Supply - standard for ○ S-Pen - used with
desktop computers Samsung Galaxy Note
● Modular PSU - allows the devices for handwriting
detachment of unnecessary ● Motion, Voice, and VIdeo Input
cables ○ Motion Input: Nintendo
Switch Joy - con for
MODULE 6 - INPUT AND OUTPUT: gaming
EXTENDING CAPABILITIES OF ○ Voice Input: Amazon
COMPUTERS AND MOBILE DEVICES Alexa for voice control
○ Video Input: Webcams for
Input - process of entering data or video conferencing
instructions into a computer or mobile
device
● Scanners and Reading Device
● Keyboards ○ Flattened Scanner -
○ Mechanical keyboard - Converts physical
used for typing on desktop documents to digital files
computer ○ Barcode Scanner - scans
○ Virtual keyboard - On- barcodes to input product
screen keyboard used data
○ on smartphones

● Pointing device
○ Wired mouse - controls the Output - data processed by the
cursor on desktops computer and presented to the uses
○ Touchpad - used on through various devices
laptops for gesture
controls ● Displays
● Touch Screens ○ LED Monitor - displays
○ Smartphones touch images and video on
screens - allows desktop computer
interactions through ○ Smartphones OLED
tapping and swiping Screen - provides vibrant
colors for media displays
● Printers
○ Inkjet Printer - prints color
photos and documents
○ Laser Printers - used for
high volume document
printing
● Other output devices
○ Speakers - play music and
sound
○ Projectors - display
images and videos on
large surfaces
○ Headphones - provide
private audio output

You might also like