Page 212 - Computer_Science_F5
P. 212

(d) Stopping unwanted access: Network        Exercise 3.10
                   security sets up rules to control who
                   can get into the network and see      1.  How do the principles of
                   sensitive information. This stops        confidentiality, integrity, and        Chapter Three: Advanced Computer Networks
                   people who should not be there from      availability (CIA triad) guide the
          FOR ONLINE READING ONLY
                   getting in, lowering the chances of      development and implementation
                   information getting stolen.              of network security policies within

               (e) Keeping business going: Good             an organisation?
                   network security helps a business     2.  Using examples, explain how
                   keep running smoothly, even if there     preventive, detective, and corrective
                   is a cyberattack. It means important     controls function within a network
                                                            security model to protect against
                   services and resources stay available,   potential threats.
                   even during tough times.

               (f)   Protecting personal info: In today’s   3.  What are the distinguishing
                                                            characteristics  of malware,
                   digital world, personal information      phishing, and denial-of-service
                   like your name, address, and             attacks, and how do these threats
                   bank details can be taken without        specifically exploit network
                   permission.                              vulnerabilities?

               (g) Following the rules: Different places   4.  How can misconfigured network
                   have rules about how data should be      devices and weak authentication
                   protected and used. Following these      mechanisms contribute to
                   rules is important to avoid getting in   security breaches, and what steps
                   trouble and to keep people’s trust.      can be taken to mitigate these

                                                            vulnerabilities?
                  Activity 3.14:


                Fostering network awareness at                Public Switched Telephone
                Mtakuja Secondary School
                                                              Networks and Mobile
               Imagine  you have  been assigned               telephone system
               the role of Network  Security
               Administrator  at Mtakuja  Secondary    Introduction to Public Switched
               School.  Outline  your  strategy  for   Telephone Network
               educating students, teachers, and staff
               about cybersecurity  best practices     Public Switched Telephone Networks
               and emphasing the importance of         (PSTN) are the traditional circuit-switched
               safeguarding personal and school        networks used for voice communication.
               information from online threats.        They are a global system of interconnected,
                                                       voice-oriented public telephone networks,

                                                    203
               Student’s Book  Form Five



     Computer Science Form 5.indd   203                                                     23/07/2024   12:33
   207   208   209   210   211   212   213   214   215   216   217