0% found this document useful (0 votes)
73 views4 pages

Computer Security Exam Insights

This document contains a unit exam for Mount Kenya University's School of Social Sciences, Department of Social and Development Studies, on the topic of computer security, fraud, and misuse. The exam instructs students to answer 3 out of 4 questions. The questions address: 1) stating 3 lessons learnt, 2) describing 5 ways such hacking incidents could be prevented, and 3) describing 3 ways such incidents could be mitigated. The document concludes with a list of 10 references.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views4 pages

Computer Security Exam Insights

This document contains a unit exam for Mount Kenya University's School of Social Sciences, Department of Social and Development Studies, on the topic of computer security, fraud, and misuse. The exam instructs students to answer 3 out of 4 questions. The questions address: 1) stating 3 lessons learnt, 2) describing 5 ways such hacking incidents could be prevented, and 3) describing 3 ways such incidents could be mitigated. The document concludes with a list of 10 references.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

MOUNT KENYA UNIVERSITY

SCHOOL OF SOCIAL SCIENCES

DEPARTMENT OF SOCIAL AND DEVELOPMENT STUDIES

UNIT CODE: BJS 1104

UNIT TITLE: COMPUTER SECURITY, FRAUD AND MISUSE

CAT I VIRTUAL EXAM

NAME: JUDITH CYLIA LUSIRI

REG NO: BCSM/2022/31294

INSTRUCTIONS: ANSWER ALL THEHREE QUESTIONS FROM

THE FOUR BELOW.

(30MKS)


Lessons learnt: State 3 lessons

 It is not morally or legally correct to use unlawful mitigation methods like negotiating
with an hacker to solve hacking problems. Such occurrences might increase the risk of
being attacked as more people might feel it is the easiest way to earn money from an
organization.
 Social media is very important tool in the management of an organization’s affairs as
in this case, the whole issue affected the image and reputation of the university
negatively through the posts made by the hacker that were not consistent with the
Christian beliefs of Kabarak Univaersity.
 Regularly update passwords: One key lesson is the importance of regularly updating
passwords for social media accounts. This helps minimize the risk of unauthorized
access. It is also very important to add extra layers of security using Two-Step
verification methods where a code must be sent to either your mobile number or email
to authenticate log in.

How could such be prevented: describe 5 ways

 Enable login notifications: Enable email or text notifications for any login attempts to
receive alerts whenever someone tries to access the account.
 Regularly update software and applications: Keep social media platforms, browsers,
and other relevant software up to date with the latest security patches to address
known vulnerabilities.
 Limit administrative access: Restrict the number of individuals with administrative
access to the social media account, ensuring that only trusted individuals have the
authority to make changes.
 Implement strong access controls: Use strong and unique passwords for social media
accounts, and consider using password management tools to securely store and
generate passwords.
 Regularly review account permissions: Audit and review the permissions granted to
different users or third-party applications connected to the social media account,
removing any unnecessary access.

3. How could such be mitigated : describe 3 ways


 Respond swiftly: In the event of a breach, take immediate action to regain control of
the compromised account, such as resetting passwords and removing unauthorized
access.
 Inform users and stakeholders: Transparently communicate the breach to users,
stakeholders, and the appropriate authorities, providing guidance on any necessary
actions they should take.
 Conduct a post-incident analysis: Perform a thorough analysis of the breach,
identifying the vulnerabilities and weaknesses that led to the incident, and implement
necessary measures to prevent future occurrences.
REFERENCES

i. Wilson, Woodrow. "Fourteen Points." World War I Document Archive. Accessed


June 21, 2023. http://wwi.lib.byu.edu/index.php/Fourteen_Points.
ii. Link, Arthur S. Woodrow Wilson and the Progressive Era, 1910-1917. Harper &
Row, 1963.
iii. Cooper, John Milton. Woodrow Wilson: A Biography. Vintage, 2011.
iv. Kennedy, David M. Over Here: The First World War and American Society. Oxford
University Press, 2004.
v. Zieger, Robert H. America's Great War: World War I and the American Experience.
Rowman & Littlefield, 2000.
vi. President Woodrow Wilson’s 14 Points (1918). (2021, September 21). National
Archives. https://www.archives.gov/milestone-documents/president-woodrow-
wilsons-14-points#:~:text=In%20the%20speech%2C%20Wilson%20directly
vii. Heywood, Andrew. Politics. Palgrave Macmillan, 2013.
viii. Roskin, Michael G., et al. Political Science: An Introduction. Pearson, 2017.
ix. Kegley, Charles W., Jr., and Shannon L. Blanton. World Politics: Trend and
Transformation. Cengage Learning, 2018.
x. Dunn, John, et al. The Oxford Handbook of Political Institutions. Oxford University
Press, 2008.

You might also like