Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Class notes COMP 407

Rating
-
Sold
-
Pages
20
Uploaded on
04-04-2026
Written in
2025/2026

These notes provide a clear introduction to computer security concepts relevant to modern crime and investigations. Designed for criminology students, they cover cybercrime, digital evidence, online threats, and basic security practices used in preventing and investigating technology-related offenses. Perfect for understanding how crime has evolved in the digital age and how security professionals respond to cyber threats.

Show more Read less
Institution
Course

Content preview

COMPUTER SECURITY

Security

Security means freedom from risk or danger: thus we define security by the risks and dangers
we want to avoid. In computer systems, these risks include unavailability of a system or
unauthorized behaviour by users; in communications systems they include unauthorized
eavesdropping, tampering, or redirection of messages. It includes both prevention and detection.
We restrict our attention to malicious behaviour by so called attackers, leaving computer
reliability to hardware experts and communications fidelity to engineers.

Information Security

We are a part of an information Society. Huge amount of Information can be speedily processed
and saved on easily accessible media. Information plays a really important part in decision
making in an organization. For an organization a wrong decision can lead to drastic result. This
is one of the reasons why information security is steadily acquiring a more central role in
business. In the world of today information is becoming increasingly important. Generally
speaking the standard of information security has not kept pace with this development. For
example, information that before was saved on a large amount of paper and physically difficult
to steal can today be saved on a disk that can easily be removed. Information security is an
attempt to protect information by making it accessible only to the intended individuals, groups or
organizations. The reason may be financial, political, tactical or purely logistical. Every
organization depending upon its resources, and the type of data it handles, has allowed a separate
budget and manpower for developing information security arrangements.

Vulnerability

Vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access
to the flaw, and attacker capability to exploit the flaw. To exploit vulnerability, an attacker must
have at least one applicable tool or technique that can connect to a system weakness. In this
frame, vulnerability is also known as the attack surface. Vulnerability management is the cyclical

,practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice
generally refers to software vulnerabilities in computing systems

Computer Security

Is the protection of computer systems and networks from the theft, disruption, misdirection, or
damage to their hardware, software, or electronic data.

Computer security are measures, procedures, and controls which provide an acceptable degree of
safety of information resources from accidental or intentional disclosure, modification, or
destruction.

Computer security is primarily concerned with information flow, and some people define
computer security as that subset of information security which pertains to computers.

The meaning of the term computer security has evolved in recent years. Before the problem of
data security became widely publicized in the media, most people’s idea of computer security
focused on the physical machine. Traditionally, computer facilities have been physically
protected for three reasons:

• To prevent theft of or damage to the hardware

• To prevent theft of or damage to the information

• To prevent disruption of service

Vulnerability

Vulnerability is a weakness which allows an attacker to reduce a system's information assurance.
Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access
to the flaw, and attacker capability to exploit the flaw. To exploit vulnerability, an attacker must
have at least one applicable tool or technique that can connect to a system weakness. In this
frame, vulnerability is also known as the attack surface. Vulnerability management is the cyclical
practice of identifying, classifying, remediating, and mitigating vulnerabilities. This practice
generally refers to software vulnerabilities in computing systems.

, Cybercrime

Offences that are committed against individuals or groups of individuals using modern
telecommunication networks such as Internet.

Written for

Institution
Course

Document information

Uploaded on
April 4, 2026
Number of pages
20
Written in
2025/2026
Type
Class notes
Professor(s)
James nyakwara
Contains
All classes

Subjects

$7.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
jameskeen474

Get to know the seller

Seller avatar
jameskeen474 Egerton university
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
1 month
Number of followers
0
Documents
5
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions