Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
11 views7 pages

Computer Application Lecture 3

The document discusses the importance of software updates, which fix bugs, enhance security, and improve performance. It highlights the components of computer security, including hardware, firmware, and software, and introduces the CIA Triad: confidentiality, integrity, and availability. Additionally, it defines software bugs and categorizes them, providing examples of common issues that can arise in software systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views7 pages

Computer Application Lecture 3

The document discusses the importance of software updates, which fix bugs, enhance security, and improve performance. It highlights the components of computer security, including hardware, firmware, and software, and introduces the CIA Triad: confidentiality, integrity, and availability. Additionally, it defines software bugs and categorizes them, providing examples of common issues that can arise in software systems.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Republic of Iraq

Imam Ja’afar Al-Sadiq


University Kirkuk
Medical Instrumentation
Techniques
Engineering Department

Computer Applications
Lecture 3

Asst.Lect. Zeman Mawlood Mohammed

2024-2023
Software Update
A software update (also known as patch) is a set of
changes to a software to update, fix or improve it.
Changes to the software will usually either fix bugs,
fix security vulnerabilities, provide new features or
improve performances and usability.

Why a software update is important?

Software updates are necessary to keep computers,


mobile devices and tablets running smoothly and
they may lower security vulnerabilities.
Here are some reasons to consider software updates
as soon as possible.
 Patch security flaws

 Get new features

 Protect data

 Improve performance

 Ensure compatibility

Security and Bugs


What is computer security?
Computer security basically is the protection of
computer systems and information from harm, theft,
and unauthorized use. It is the process of preventing
and detecting unauthorized use of your computer
system.

The components of a computer system that needs to


be protected are:
 Hardware, the physical part of the computer,
like the system memory and disk drive.
 Firmware, permanent software that is etched
into a hardware device’s nonvolatile memory
and is mostly invisible to the user.
 Software, the programming that offers services,
like operating system, word processor, internet
browser to the user .

The CIA Triad


Computer security is mainly concerned with three
main areas:
 Confidentiality is ensuring that information is
available only to the intended audience.
 Integrity is protecting information from being
modified by unauthorized parties.
 Availability is protecting information from being
modified by unauthorized parties.

Computer security threats


Computer security threats are possible dangers that
can possibly hamper the normal functioning of your
computer. In the present age, cyber threats are
constantly increasing as the world is going digital.
The most harmful types of computer security are:
Viruses, Computer Worm, Phishing, Botnet.
What is a Software Bug?
Software bugs are errors, flaws, deficiencies, or
defects in a computer program or system that cause
it to produce an incorrect or unexpected result or to
behave in unintended ways.
Different Types of Bugs in Software Testing:
Software bugs can be classified into multiple
categories based on their nature and impact. Broadly
speaking, these categories include:
 Functional Bugs
 Logical Bugs
 Workflow Bugs
 Security Bugs

Common examples of software bugs include:

 Unexpected program crashes


 Incorrect calculations,
 Data missing from a database
 Security vulnerabilities
 Unnatural slowness
Successors are always looking for opportunities to help
others, while the failures always ask what we will
benefit from

...

‫ًا عن الفرص لمساعدة اآلخرين‬


‫" الناجحون يبحثون دائم‬
‫ًا ماذا سوف نستفيد نحن‬
‫بينما الفاشلون يسألون دائم‬
"‫من ذلك‬

You might also like