Computer System Security and Laws Question Papers

About Computer security : Computer security, cybersecurity or information technology security(IT security) is the protection of computer systems from theft or damage to their hardware, software or electronic data, as well as from disruption ormisdirection of the services they provide.

The field is growing in importance due to increasing reliance on computer systems, the Internet[2] and wireless networks such as Bluetooth and Wi-Fi, and due to the growth of “smart” devices, including smartphones, televisionsand the various tiny devices that constitute the Internet of things. Due to its complexity, both in terms of politics and technology, it is also one of the major challenges of the contemporary world.[3]

Here You Will Find All CSSL Question Papers


May June 18       Nov Dec 18


May June 2017 (REV)      Nov Dec 17


May June 2016    Nov Dec 2016


May June 2015

More About computer  security : 

Defining Computer Security

If you want a computer to be perfectly secure, you could fill it with concrete and dump it in the ocean. This would protect any information on the computer from inappropriate use. Unfortunately, the computer would be completely unusable, so you probably don’t want to do that! Since you want to both use your computer and keep it safe, you should practice good computer security. Computer security allows you to use the computer while keeping it safe from threats.

Computer security can be defined as controls that are put in place to provide confidentiality, integrity, and availability for all components of computer systems. These components include data, software, hardware, and firmware. This is a complex definition. Let’s illustrate the definition by showing you a day in the life of Samantha, a security manager just hired for a small company. The company doesn’t have any computer security yet, so she knows to start with the very basics.

Components of Computer Systems

Samantha’s first order of business is learning about the components of the computer systems she needs to protect. She asks the IT manager what kind of hardware, firmware, and software the company uses.

    • Hardware is the physical part of the computer, like the system memory and disk drive.
    • Firmware is the permanent software that runs the processes of the computer and is mostly invisible to the user, like the start-up functions that make elements of the hardware work together.
  • Software is the programming that offers services to the user and administrator. The operating system, word processor, computer games, and Internet browser are all examples of software commonly found on a computer.

Learning about these components tells Samantha what hardware, software, and firmware she has to protect. She doesn’t know what types of data she’ll need to protect yet, but Samantha will work with people across the company to learn what information is stored and processed in the computer systems. Samantha knows that she’ll have to learn about which data is important to the company, and she’ll have to protect its confidentiality, integrity, and availability.