Unit 1.3 Computer Security

AM4N G4UT4M
20 Min Read

Every time you save a file, browse the internet, or log into an account, your data is at risk. In a world where information is one of the most valuable assets, keeping it safe is no longer optional — it is a necessity. This is exactly what computer security is all about.

From the moment a computer is turned on, it faces threats — both physical and digital. A stolen laptop, a virus spreading through a USB drive, a hacker accessing your cloud storage, or a power surge frying your hardware — all of these are real, everyday dangers that computer security class 10 teaches you to understand and prevent.

This unit — Computer Security, Unit 1.3 of Class 10 Computer Science — gives you a complete picture of how computers and their data are protected. You will learn about:

  • Types of computer security — Hardware, Software, and Information Security
  • Key principles of information security — the CIA Triad (Confidentiality, Integrity, Availability)
  • Security threats — physical, non-physical, and human threats
  • Types of malware — Virus, Worm, Trojan, Spyware, Ransomware, and more
  • Security mechanisms — Firewalls, Cryptography, Antivirus, Authentication & Backup
  • Hardware security measures — UPS, Volt Guard, Spike Guard, and physical protection

Whether you are safeguarding your personal files or preparing for your SEE examination, understanding cyber security and computer security mechanisms is one of the most practical and important skills you can develop in today’s digital age.

- Advertisement -

1. Computer Security

Definition: Computer security refers to protecting a computer and its contents — data, programs, and hardware — from damage, theft, or misuse, and taking action to prevent such incidents.

Computer security covers three main areas:

  • Data and Information Security — protecting stored and transmitted data
  • Software Security — protecting programs and applications from damage or misuse
  • Hardware Security — protecting physical components from theft or physical harm

Types of Computer Security

Type of SecurityWhat It ProtectsExamples
Hardware SecurityPhysical devices and equipmentUPS, locks, CCTV, dust-free rooms
Software SecurityPrograms, files, and dataAntivirus, passwords, backup, firewall
Information SecurityData from unauthorized access or modificationEncryption, authentication, access control

2. Information Security (InfoSec)

Definition: Information security is the practice of preventing unauthorized access, use, disclosure, modification, recording, or destruction of information.

Key Principles of Information Security — The CIA Triad

PrincipleMeaningExample
ConfidentialityOnly authorized users can access data and resourcesPassword-protected files, encrypted emails
IntegrityOnly authorized users can modify data when neededDigital signatures, checksums
AvailabilityData must be accessible to users whenever neededRegular backups, server uptime

How to Protect Your Data

  1. Regularly check your hard disk and replace it if failure symptoms appear
  2. Copy important data to another disk within the system to prevent accidental loss
  3. Use cloud storage services such as Google Drive, Dropbox, iCloud, or OneDrive for online backup
  4. Send critical files as email attachments to your own account (Gmail, Hotmail) as an extra backup
  5. Protect storage spaces, folders, and files with strong passwords to block unauthorized access

3. Security Threats

Definition: A security threat is a risk that can potentially harm computer systems, data, or an organization. Threats can be physical or non-physical in nature.

Types of Security Threats

Internal Threats

Threats that originate inside the system or environment:

- Advertisement -
  • Fire within the computer room
  • Unstable or fluctuating power supply
  • High humidity in rooms housing hardware

External Threats

Threats that come from outside the environment:

  • Lightning strikes, floods, and earthquakes
  • Natural disasters damaging physical infrastructure

Human Threats

Threats caused by human actions, either intentional or accidental:

  • Theft or vandalism of hardware
  • Accidental or intentional data deletion
  • Unauthorized access to systems and data
  • Hacking, phishing, and other cyberattacks

Consequences of Security Threats

  • Loss or corruption of important data
  • Disruption of business and educational operations
  • Loss of sensitive personal or organizational information
  • Unauthorized access to private computer resources

Specific Security Threats to Know

Phishing

A fraudulent attempt to obtain sensitive information — usernames, passwords, credit card numbers — by disguising as a trustworthy entity in electronic communication (emails, fake websites).

- Advertisement -

Botnet

A network of internet-connected devices (computers, smartphones, IoT devices) whose security has been compromised and are secretly controlled by a third party to carry out attacks.

Rootkit

Malicious code that hides deep within a system and grants the attacker continuous administrator-level access while actively concealing its presence from the user and antivirus tools.

Keylogger

Hardware or software that secretly records every keystroke made on a keyboard without the user’s knowledge — capturing passwords, messages, and financial data.

4. Malicious Code (Malware)

Definition: Malware (malicious software) refers to any software or code designed to harm, damage, or gain unauthorized access to computer systems, networks, or data.

Types of Malware

TypeHow It WorksKey Feature
VirusCopies itself and attaches to files; spreads when files are sharedMost common; needs human action to spread
WormSelf-replicates and spreads across networks automaticallyNo human intervention needed
Trojan HorseDisguises as a harmless program but carries malicious codeDeceives the user
SpywareMonitors user activity and collects data without knowledgeSteals passwords and browsing habits
AdwareDisplays unwanted advertisements automaticallyCollects data for marketing
KeyloggerRecords every keystroke on the keyboard secretlyCaptures passwords and sensitive input
RansomwareEncrypts files and demands payment to restore accessCauses data loss and operational disruption

How Computer Viruses Spread

  • Sharing infected portable storage devices such as USB/pen drives
  • Opening virus-infected emails, messages, or attached files
  • Downloading files or programs from unsecured or unknown websites
  • Connecting to unsecured networks or compromised devices

How to Protect Your System from Malware

  • Never download files from unknown or untrusted sources
  • Install latest antivirus software and update it regularly
  • Delete spam and junk emails without opening or forwarding them
  • Always scan a pen drive from an unknown source before use
  • Backup your data regularly to an external or cloud location
  • Enable a firewall on your device and network
  • Use strong and unique passwords for all accounts

5. Security Mechanisms

Security mechanisms are tools, techniques, and systems designed to detect, prevent, or recover from security attacks. The five major security mechanisms are:

Authentication System

Definition: Authentication is the process of verifying the identity of a person or device before granting access to a system or resource.

a) Password

A password is a set of secret characters — letters, numbers, and symbols — used to confirm the identity of a user and protect data from unauthorized access.

Tips for a strong and secure password:

  • Never use easily guessable information such as your name, date of birth, or pet’s name
  • Avoid sequences like abcd or 1234
  • Use a mix of uppercase, lowercase, numbers, and special symbols
  • Never use the same password across multiple accounts
  • Change your password regularly and never share it with anyone
  • Password should be at least 8 characters long

b) Biometric Authentication

Biometrics use unique physical or behavioural human characteristics to verify identity and grant access to systems, devices, or data.

  • Fingerprint scanning — most common biometric method
  • Facial recognition — e.g., Apple’s Face ID (introduced with iPhone X)
  • Retinal scan — eye scan used for high-security access
  • Voice recognition — identifies a person by their unique voice pattern

Firewall

Definition: A firewall is a network security system (hardware or software) that monitors, filters, and controls incoming and outgoing network traffic based on a set of predefined security rules.

  • Blocks unwanted and malicious traffic from reaching your computer
  • Prevents unauthorized access to private networks
  • Software firewalls are installed on individual computers to control app-level traffic
  • Hardware firewalls are built into routers and protect entire networks

Cryptography

Definition: Cryptography is the practice of protecting information by transforming it into a secret coded format so that only authorized recipients can read it.

The word comes from the Greek roots: “crypt” meaning hidden, and “graphy” meaning writing.

Features of Cryptography

  • Confidentiality — only the intended person can access the information
  • Integrity — information cannot be changed without detection
  • Non-repudiation — the sender cannot deny having sent the information
  • Authentication — identities of both sender and receiver are verified

Encryption vs. Decryption

EncryptionDecryption
Converts readable data (plaintext) into unreadable form (ciphertext)Converts ciphertext back into its original readable form (plaintext)
Done by the SENDER before transmitting dataDone by the RECEIVER after receiving data
Makes data safe from theft during transmissionRestores the data for the authorized recipient
Uses a key/algorithm to scramble the dataUses the same key/algorithm to unscramble the data

Antivirus Software

Definition: Antivirus software is a program designed to detect, block, and remove malicious software from a computer system, ensuring a virus-free environment.

Common antivirus programs: Kaspersky, Quick Heal, Norton Antivirus, Panda Antivirus, AVG, McAfee, NOD32

Main functions of antivirus:

  • Detect and remove viruses and malware from the system
  • Protect data and programs from being corrupted
  • Provide real-time scanning of files, emails, and downloads

Backup System

Definition: A backup is a duplicate copy of data and programs stored in a separate, secure location to protect against accidental or intentional data loss.

Why backup is important:

  • Saves data from being permanently lost due to hardware failure or virus attack
  • Allows quick recovery of lost or damaged files and software
  • Protects against ransomware by keeping a clean copy of your data

Where to store backups: External hard drives, CDs, DVDs, USB drives, and cloud storage (Google Drive, Dropbox, OneDrive)

6. Hardware Security

Definition: Hardware security is the protection of physical computer components — monitors, CPUs, keyboards, storage devices — from accidental or intentional physical damage, theft, or environmental harm.

Hardware Security Measures

a) Regular Maintenance

Computers require periodic maintenance to keep hardware in good working condition, identify early problems, and fix them before they cause serious damage.

b) Insurance

Computer equipment should be insured against damage or theft. In case of loss, insurance provides financial compensation to replace or repair the affected hardware.

c) Dust-Free Environment

Dust particles cause short circuits and hardware failure. Computer rooms must be kept absolutely free from dust and air pollutants using air filters and sealed rooms.

d) Protection from Fire

Faulty wiring, loose connections, overloaded power sockets, and smoking in computer rooms can cause fires. Use fire alarms, fire doors, fire detectors, and fire extinguishers to minimize damage.

e) Protection from Theft

Computer rooms must have physical security — proper locking systems, controlled access for authorized persons only, human guards, or biometric entry systems.

f) Air Conditioning System

Computers generate heat and require a controlled environment. Room temperature should be maintained between 21°C to 24°C and humidity levels should be regulated to prevent moisture damage.

g) Power Protection Devices

Computers require a constant 220–240 volts of electricity. Unstable power supply can damage hardware and cause data loss. Power protection devices guard against this.

Power Protection Devices

DeviceFull FormPurpose
UPSUninterruptible Power SupplyProvides battery backup during power failure; prevents data loss
Volt GuardVoltage GuardProvides constant output voltage when input voltage is too high
CVTConstant Voltage TransformerMaintains stable voltage output regardless of input fluctuations
Spike GuardSurge/Spike GuardProtects devices from sudden voltage spikes
Surge SuppressorAbsorbs and redirects excess electrical energy from surges
StabilizerRegulates voltage to protect devices from both high and low voltage

Importance of UPS

UPS (Uninterruptible Power Supply) is a battery-backed power protection device that:

  • Supplies backup electric power during power failures
  • Controls voltage fluctuations to protect hardware from damage
  • Gives the user time to save work and shut down safely during unexpected outages
  • Prevents data loss and hardware damage caused by sudden power cuts

7. Software Security

Definition: Software security is the protection of software programs, files, documents, and data from being lost, damaged, or corrupted due to accidental or intentional harm.

Software Security Measures

  • Password — restricts unauthorized access to files, folders, and systems
  • Backup — creates duplicate copies of data in a secure location
  • Antivirus — detects and removes viruses and malware
  • Cryptography — encrypts data to prevent unauthorized reading
  • Firewall — monitors and filters network traffic
  • Using original software — licensed software reduces risk of hidden malware
  • Scan Disk — checks the disk for bad sectors, lost clusters, and file errors and repairs them

Scan Disk

Scan disk is a system utility that checks and repairs disk errors — including bad sectors, lost clusters, lost chains, and corrupted files — to maintain disk health and data integrity.

8. Quick Comparison — Security Mechanisms at a brief

MechanismPrimary FunctionType
PasswordVerifies user identity before granting accessAuthentication
BiometricUses physical traits (fingerprint, face) for identity verificationAuthentication
FirewallMonitors and filters network trafficPrevention
EncryptionConverts data into unreadable code for safe transmissionCryptography
DecryptionConverts coded data back to readable formCryptography
AntivirusDetects and removes malware from the systemDetection & Removal
BackupCreates a duplicate copy of data in a safe locationRecovery
Scan DiskChecks and repairs disk errors and bad sectorsMaintenance
UPSProvides battery backup during power failureHardware Protection

📝 Important Exam Questions

Frequently asked questions in the Nepal SEE examination for Unit 1.3:

  1. What is computer security? Define with its types.
  2. What is information security? Explain the three key principles (CIA Triad).
  3. Define malware. List and explain any four types of malware.
  4. What is a computer virus? How does it spread? Write any three ways.
  5. What is a firewall? Write its importance in computer security.
  6. Differentiate between encryption and decryption. Write two differences.
  7. What is UPS? Why is UPS used in a computer system?
  8. Write any five hardware security measures.
  9. What is a backup system? Write its importance.
  10. What is cryptography? Write its features.
  11. What is biometric authentication? Give two examples.
  12. List any five software security measures.
  13. What is antivirus software? Give four examples.
  14. Write the criteria for a strong password.
  15. What is a power protection device? Name any four types.

Conclusion

In today’s digital world, computer security is not a luxury — it is a fundamental requirement. Every individual, school, business, and government institution that relies on computers must actively protect its systems, data, and hardware from the ever-growing landscape of threats.

This unit has introduced the three pillars of computer security: hardware security, software security, and information security. Together, these form a comprehensive shield against threats ranging from natural disasters and power failures to sophisticated cyberattacks and data breaches.

The CIA Triad — Confidentiality, Integrity, and Availability — serves as the guiding framework for all information security decisions. Whether you are setting a password, encrypting a file, or configuring a firewall, you are applying one or more of these principles.

Understanding types of malware — from viruses and worms to ransomware and keyloggers — empowers you to recognize threats before they cause damage. Combining this knowledge with practical security mechanisms like antivirus software, firewalls, cryptography, authentication systems, and regular backups creates a strong multi-layered defence.

On the hardware side, measures like UPS, Volt Guard, Spike Guard, dust-free environments, air conditioning, fire protection, and physical access control ensure that the physical infrastructure of a computer system remains safe and operational at all times.

Ultimately, computer security is everyone’s responsibility. From choosing a strong password to backing up your data regularly, the habits you build now as a Class 10 student will protect you throughout your digital life.

  💡 Key Takeaway: Security is not a product you install once — it is a continuous practice. Stay updated, stay alert, and stay protected.

Share This Article
Leave a Comment