0% found this document useful (0 votes)
16 views2 pages

Harar Senior Secondary School: Assignment Of: ICT

The document outlines various aspects of security in information technology, including information security, computer security, and network security. It details specific types of security such as endpoint, application, data, cloud, IoT, and physical security, emphasizing the importance of protecting data and systems from unauthorized access and threats. Each category includes methods and practices to ensure the security and integrity of information and devices.

Uploaded by

shaiidabrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views2 pages

Harar Senior Secondary School: Assignment Of: ICT

The document outlines various aspects of security in information technology, including information security, computer security, and network security. It details specific types of security such as endpoint, application, data, cloud, IoT, and physical security, emphasizing the importance of protecting data and systems from unauthorized access and threats. Each category includes methods and practices to ensure the security and integrity of information and devices.

Uploaded by

shaiidabrahim
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

HARAR SENIOR SECONDARY SCHOOL

Assignment of: ICT


Name ______________________________________
Nō __________
Grade 9th __________

Submission date: 12/9/2025 Submitted to: Gezachoo


1. Information Security: Protects data from unauthorized access, modification, or destruction. It ensures
confidentiality, integrity, and availability (CIA triad) of information.

2. Computer Security: Focuses on safeguarding computer systems and networks from cyber threats,
including viruses, malware, and unauthorized access. It includes practices like firewalls, antivirus
software, and encryption.

1. Network Security: Protects networks from intrusions, misuse, or unauthorized access. Techniques
include firewalls, intrusion detection systems (IDS), and encryption.

2. Endpoint Security: Focuses on securing individual devices (like PCs and mobile phones) from malware
and unauthorized access, using antivirus software and device management tools.

3. Application Security: Secures software applications by detecting and fixing vulnerabilities through
secure coding, application firewalls, and patch management.

4. Data Security: Ensures the protection of data at rest and in transit through encryption, data masking,
and access controls.

5. Cloud Security: Protects data and applications hosted in cloud environments, using encryption,
identity management, and secure access protocols.

6. Internet of Things (IoT) Security: Secures smart devices and interconnected systems from hacking,
using authentication, encryption, and secure firmware updates.

7. Physical Security: Protects hardware and infrastructure from physical threats, such as theft or natural
disasters, using surveillance, locks, and secure access controls.

You might also like