You are on page 1of 8

Running head: COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES 1

Computer Concepts and Internet Technologies

Name

Institution Affiliation
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
2

Computer Concepts and Internet Technologies

Part 1

Select one of the sections in Unit 7 and research one of the main points. Write at least 2

paragraphs on the point.

Basic Security

Information security has become a continuing concern in all areas of an information

system. Security is neither considered as software nor as product; it is a disciple that needs to

be taken into consideration in any organizational decision. Three basic security concepts that

are important to information on the internet are integrity, confidentiality, and availability.

Concepts that must relate to the user of that information and the basic digital security are

authentication, and encryption.

Authentication is a process or technique that ensures and confirms a user’s identity.

Authentication is considered as one of the five pillars of information assurance (IA)

[ CITATION Dav05 \l 2057 ]. The other related pillars to information assurance are

nonrepudiation, availability, confidentiality, and integrity. Users are usually identified with a

user ID, and the authentication is accomplished when the user provides a credential, for

instance a password, PINs, fingerprint scans, and facial recognition, that matches with the

user ID.

Encryption is a way of scrambling data so that only authorize parties can understand

the information. Encrypted data is commonly referred to as ciphertext, while unencrypted

data is known as plaintext. Data encryption software, also known as an encryption algorithm

or cipher, is used to develop an encryption scheme which theoretically can only be broken

with large amount of computing power. According to Cozzen and Miller (2013) they dictates

that an encryption algorithm is the mathematical formular used to transform data into

ciphertext. An algothrithm will use the key in order to alter the data in a predictable way, so
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
3

that even though the encrypted date will appear random, it can be tuned back into plaintext by

using the key again.

Part 2

What are three methods for restricted unauthorized access to computer systems and/or

files? Briefly explain each method.

Most users want to take steps to prevent others from accessing their computer. Whether it's

protecting yourself from malware or making sure your private information is safe, having a

secure computer can give you peace of mind. There are many ways you can protect your

computer and files against others outline in the following section.

(a) Use of Passwords

Using passwords is the most widely used method for preventing unauthorized access.

A password is a string of characters used to access a system by authenticating a user. The

password must be kept secret and intended for specific users at all times. In computer

systems, each password is associated with specific username since many people can access

the same program. Good passwords are important to keeping files and computer systems

secure.

(b) Operating system and software patches and updates

There is no such thing as perfect software. Often, programs have compatibility

problems or vulnerabilities that may compromise the security of your computer. Software

patches, updates, and drivers are made available to consumers, often free of charge, to help

maintain proper and secure running of a software program and operating systems.

(c) Malware protection

Viruses, trojans, spyware, and other malware can help monitor your computer and log

keystrokes to replicate sensitive data such as passwords and information on credit cards. To
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
4

assist in protecting your computer from these threats, it is suggested that the user ti install

both spyware and virus protection programs.

2. Malware, viruses and trojans are all dangerous to computers and files. Briefly explain

each type and describe any differences between how each form acts and how it can

affect computer operations

(a) Malware

Malware is shorthand for malicious software. It is a software developed b cyber

attackers with intention of gaining access or causing damage to a computer or network. Often

while the victim remains oblivious to the fact there’s been a compromise. Most malware

infections occur when you inadvertently perform an action that causes the malware to be

downloaded. The action may be completed by licking an email, or visiting a malicious

website.

(b) Viruses

A computer virus is a form of malware that propagates by injecting a copy of itself

into another program and becoming part of it. It spreads from one computer to another, while

travelling; it leaves an infection to each computer. The severity of viruses can range from

causing mildly annoying effects to damaging data or software and causing conditions of

denial of service (DoS). Nearly all viruses are attached to an executable file, meaning that the

virus may exist on a system but will not be active or able to spread until the malicious host

file or program is run or opened by a user. The viral code is also executed when the host code

is executed. The host program will normally continue to function after it is infected with the

virus.

(c) Trojans

Another type of malware named after the wooden horse used by the Greeks to

infiltrate Troy is a Trojan. It's a harmful piece of legitimate software. Usually, users are
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
5

fooled into installing and running it on their machines. It can achieve any number of attacks

on the host after it is activated, from irritating the user (popping up windows or changing

desktops) to damaging the host (deleting files, stealing data, or activating and spreading other

malware like viruses). Trojans are also known to create backdoors to provide access to the

system to malicious users. In contrast to viruses and worms, Trojans do not reproduce or self-

replicate by infecting other files. Trojans need to spread through user experiences such as

opening an email attachment or downloading and running an Internet file.

3. What is social engineering?

Social engineering is the term used for a broad range of malicious activities

accomplished through human interactions. It uses psychological manipulation to trick user

into making security mistakes or giving away sensitive information.

4. Spam, Phishing, Pharming – what are they and what do they do?

(a) Spam

Spam is the process of sending unsolicited email, social media messages, or instant

messages. These messages are fairly easy to spot and can be damaging when one opens or

responds.

(b) Phishing

Phishing is a cybercriminal or scammer’s attempt of stealing sensitive data from

people through fraudulent means. An email is sent that looks legitimate and trustworthy

source, the message is meant to lure you into revealing sensitive or confidential information.

(c) Pharming

Pharming is a type of cyber attack that is similar to phishing in that its goals are to

steal sensitive financial and personal information, by gathering usernames and passwords.

They achieve their purpose by automatically redirecting the recipient a fake and malicious

website, as opposed to phishing that tries to manipulate the recipient into accessing them.
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
6

Part 3 Globalization

(a) Search online for statistics about malware incidents by country. Which countries are

hardest hit by malware?

Malware continues to be one of the biggest challenges to information security.

Globally, some countries tend to be exposed to malware at a higher note in comparison to

other countries[ CITATION Jun18 \l 2057 ]. The table below shows top 10 countries globally

those are hardest hit by malware as of 2019 statistics.

Country Percentage (%) Malware Attacks

1 Iran 28.31
2 Bangladesh 28.10

3 Algeria 24.77

4 Pakistan 24.00

5 Tanzania 23.07

6 Nigeria 22.69

7 India 21.65

8 Indonesia 18.13

9 Sri Lanka 15.96

10 Kenya 15.38

Fig. 001 shows the statistical analysis of the most hit countries by the malware.

Examine the other side of the issue to gather statistics about which countries are the

source of most malware attacks


COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
7

Cybersecurity has become the new ‘in-word’ worldwide as individuals and companies

struggle to protect their information aganist attacks online. With in Cyber threats pose a

serious threat to governments, companies, societies, and individuals as data grows

exponentially in value and size.Cyber security practices that are constantly evolving have

helped nations like the U.S., Canada, and Australia to be better prepared for cyber attacks,

experts say.On the other hand, as per Akamai technology's Q1 2016 security report, the US–

along with China and Turkey –has also been found to be one of the world's largest source

countries for cyber attacks. Most of these attacks originate in groups or individually from

unknown hackers, the report that are found. Top 10 source countries for malware attacks are

as shown in the table below;

Country Percentage (%) source that the

county attacks.
1 China 41

2 United States 10

3 Turkey 4.7

4 Russia 4.3

5 Taiwan 3.7

6 Brazil 3.3

7 Romania 2.8

8 India I

9 Italy 1.6

10 Hungary 1.4
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
8

References

Cozzens, M. B., & Miller, S. J. (2013). The mathematics of encryption : an elementary

introduction. Providence, Rhode Island: American Mathematical Society.

Maltoni, D., & Jain, A. K. (2005). Biometric Authentication. Berlin ; London: Springer.

Parsons, J. J. (2018). New perspectives on computer concepts 2018 : Introductory.

Vancouver, B.C: Langara College,.

You might also like