Trusted by millions of Kenyans
Study resources on Kenyaplex

Get ready-made curriculum aligned revision materials

Exam papers, notes, holiday assignments and topical questions – all aligned to the Kenyan curriculum.

How can you detect and protect a computer against crimes?

Explain ways of detecting and protecting a computer against crimes.

Answers


Maurice
(a) Log files: These are special files that keep a record (log) of events on the use of computers and resources of the information system.

(b) Firewalls: A firewall is a program or hardware that filters data and information coming from the internet to your computer or between networks.
Firewall can prevent spam or filter downloaded contents.

(c) Audit trails: An audit trail ( or audit log) is a security-relevant chronological record, set of records, or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event. Audit trails help to detect trespassing and alterations. For example, CAAT( Computer Aided Audit Trail Software).

(d) Data encryption: Refers to the process of mixing (encoding/ encrypt) data in form that only the sender and the receiver understands. Data encryption is a useful tool against tapping.
maurice.mutuku answered the question on April 17, 2018 at 05:55

Answer Attachments

Exams With Marking Schemes

Related Questions