MOUNT KENYA UNIVERSITY
SCHOOL OF SOCIAL SCIENCES
DEPARTMENT OF SOCIAL AND DEVELOPMENT STUDIES
UNIT CODE: BJS 1104
UNIT TITLE: COMPUTER SECURITY, FRAUD AND MISUSE
CAT I VIRTUAL EXAM
NAME: JUDITH CYLIA LUSIRI
REG NO: BCSM/2022/31294
INSTRUCTIONS: ANSWER ALL THEHREE QUESTIONS FROM
THE FOUR BELOW.
(30MKS)
Lessons learnt: State 3 lessons
It is not morally or legally correct to use unlawful mitigation methods like negotiating
with an hacker to solve hacking problems. Such occurrences might increase the risk of
being attacked as more people might feel it is the easiest way to earn money from an
organization.
Social media is very important tool in the management of an organization’s affairs as
in this case, the whole issue affected the image and reputation of the university
negatively through the posts made by the hacker that were not consistent with the
Christian beliefs of Kabarak Univaersity.
Regularly update passwords: One key lesson is the importance of regularly updating
passwords for social media accounts. This helps minimize the risk of unauthorized
access. It is also very important to add extra layers of security using Two-Step
verification methods where a code must be sent to either your mobile number or email
to authenticate log in.
How could such be prevented: describe 5 ways
Enable login notifications: Enable email or text notifications for any login attempts to
receive alerts whenever someone tries to access the account.
Regularly update software and applications: Keep social media platforms, browsers,
and other relevant software up to date with the latest security patches to address
known vulnerabilities.
Limit administrative access: Restrict the number of individuals with administrative
access to the social media account, ensuring that only trusted individuals have the
authority to make changes.
Implement strong access controls: Use strong and unique passwords for social media
accounts, and consider using password management tools to securely store and
generate passwords.
Regularly review account permissions: Audit and review the permissions granted to
different users or third-party applications connected to the social media account,
removing any unnecessary access.
3. How could such be mitigated : describe 3 ways
Respond swiftly: In the event of a breach, take immediate action to regain control of
the compromised account, such as resetting passwords and removing unauthorized
access.
Inform users and stakeholders: Transparently communicate the breach to users,
stakeholders, and the appropriate authorities, providing guidance on any necessary
actions they should take.
Conduct a post-incident analysis: Perform a thorough analysis of the breach,
identifying the vulnerabilities and weaknesses that led to the incident, and implement
necessary measures to prevent future occurrences.
REFERENCES
i. Wilson, Woodrow. "Fourteen Points." World War I Document Archive. Accessed
June 21, 2023. http://wwi.lib.byu.edu/index.php/Fourteen_Points.
ii. Link, Arthur S. Woodrow Wilson and the Progressive Era, 1910-1917. Harper &
Row, 1963.
iii. Cooper, John Milton. Woodrow Wilson: A Biography. Vintage, 2011.
iv. Kennedy, David M. Over Here: The First World War and American Society. Oxford
University Press, 2004.
v. Zieger, Robert H. America's Great War: World War I and the American Experience.
Rowman & Littlefield, 2000.
vi. President Woodrow Wilson’s 14 Points (1918). (2021, September 21). National
Archives. https://www.archives.gov/milestone-documents/president-woodrow-
wilsons-14-points#:~:text=In%20the%20speech%2C%20Wilson%20directly
vii. Heywood, Andrew. Politics. Palgrave Macmillan, 2013.
viii. Roskin, Michael G., et al. Political Science: An Introduction. Pearson, 2017.
ix. Kegley, Charles W., Jr., and Shannon L. Blanton. World Politics: Trend and
Transformation. Cengage Learning, 2018.
x. Dunn, John, et al. The Oxford Handbook of Political Institutions. Oxford University
Press, 2008.