HARAR SENIOR SECONDARY SCHOOL
Assignment of: ICT
Name ______________________________________
Nō __________
Grade 9th __________
Submission date: 12/9/2025 Submitted to: Gezachoo
1. Information Security: Protects data from unauthorized access, modification, or destruction. It ensures
confidentiality, integrity, and availability (CIA triad) of information.
2. Computer Security: Focuses on safeguarding computer systems and networks from cyber threats,
including viruses, malware, and unauthorized access. It includes practices like firewalls, antivirus
software, and encryption.
1. Network Security: Protects networks from intrusions, misuse, or unauthorized access. Techniques
include firewalls, intrusion detection systems (IDS), and encryption.
2. Endpoint Security: Focuses on securing individual devices (like PCs and mobile phones) from malware
and unauthorized access, using antivirus software and device management tools.
3. Application Security: Secures software applications by detecting and fixing vulnerabilities through
secure coding, application firewalls, and patch management.
4. Data Security: Ensures the protection of data at rest and in transit through encryption, data masking,
and access controls.
5. Cloud Security: Protects data and applications hosted in cloud environments, using encryption,
identity management, and secure access protocols.
6. Internet of Things (IoT) Security: Secures smart devices and interconnected systems from hacking,
using authentication, encryption, and secure firmware updates.
7. Physical Security: Protects hardware and infrastructure from physical threats, such as theft or natural
disasters, using surveillance, locks, and secure access controls.