Page 212 - Computer_Science_F5
P. 212
(d) Stopping unwanted access: Network Exercise 3.10
security sets up rules to control who
can get into the network and see 1. How do the principles of
sensitive information. This stops confidentiality, integrity, and Chapter Three: Advanced Computer Networks
people who should not be there from availability (CIA triad) guide the
FOR ONLINE READING ONLY
getting in, lowering the chances of development and implementation
information getting stolen. of network security policies within
(e) Keeping business going: Good an organisation?
network security helps a business 2. Using examples, explain how
keep running smoothly, even if there preventive, detective, and corrective
is a cyberattack. It means important controls function within a network
security model to protect against
services and resources stay available, potential threats.
even during tough times.
(f) Protecting personal info: In today’s 3. What are the distinguishing
characteristics of malware,
digital world, personal information phishing, and denial-of-service
like your name, address, and attacks, and how do these threats
bank details can be taken without specifically exploit network
permission. vulnerabilities?
(g) Following the rules: Different places 4. How can misconfigured network
have rules about how data should be devices and weak authentication
protected and used. Following these mechanisms contribute to
rules is important to avoid getting in security breaches, and what steps
trouble and to keep people’s trust. can be taken to mitigate these
vulnerabilities?
Activity 3.14:
Fostering network awareness at Public Switched Telephone
Mtakuja Secondary School
Networks and Mobile
Imagine you have been assigned telephone system
the role of Network Security
Administrator at Mtakuja Secondary Introduction to Public Switched
School. Outline your strategy for Telephone Network
educating students, teachers, and staff
about cybersecurity best practices Public Switched Telephone Networks
and emphasing the importance of (PSTN) are the traditional circuit-switched
safeguarding personal and school networks used for voice communication.
information from online threats. They are a global system of interconnected,
voice-oriented public telephone networks,
203
Student’s Book Form Five
Computer Science Form 5.indd 203 23/07/2024 12:33

