Professional Documents
Culture Documents
Name
Institution Affiliation
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
2
Part 1
Select one of the sections in Unit 7 and research one of the main points. Write at least 2
Basic Security
system. Security is neither considered as software nor as product; it is a disciple that needs to
be taken into consideration in any organizational decision. Three basic security concepts that
are important to information on the internet are integrity, confidentiality, and availability.
Concepts that must relate to the user of that information and the basic digital security are
[ CITATION Dav05 \l 2057 ]. The other related pillars to information assurance are
nonrepudiation, availability, confidentiality, and integrity. Users are usually identified with a
user ID, and the authentication is accomplished when the user provides a credential, for
instance a password, PINs, fingerprint scans, and facial recognition, that matches with the
user ID.
Encryption is a way of scrambling data so that only authorize parties can understand
data is known as plaintext. Data encryption software, also known as an encryption algorithm
or cipher, is used to develop an encryption scheme which theoretically can only be broken
with large amount of computing power. According to Cozzen and Miller (2013) they dictates
that an encryption algorithm is the mathematical formular used to transform data into
ciphertext. An algothrithm will use the key in order to alter the data in a predictable way, so
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
3
that even though the encrypted date will appear random, it can be tuned back into plaintext by
Part 2
What are three methods for restricted unauthorized access to computer systems and/or
Most users want to take steps to prevent others from accessing their computer. Whether it's
protecting yourself from malware or making sure your private information is safe, having a
secure computer can give you peace of mind. There are many ways you can protect your
Using passwords is the most widely used method for preventing unauthorized access.
password must be kept secret and intended for specific users at all times. In computer
systems, each password is associated with specific username since many people can access
the same program. Good passwords are important to keeping files and computer systems
secure.
problems or vulnerabilities that may compromise the security of your computer. Software
patches, updates, and drivers are made available to consumers, often free of charge, to help
maintain proper and secure running of a software program and operating systems.
Viruses, trojans, spyware, and other malware can help monitor your computer and log
keystrokes to replicate sensitive data such as passwords and information on credit cards. To
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
4
assist in protecting your computer from these threats, it is suggested that the user ti install
2. Malware, viruses and trojans are all dangerous to computers and files. Briefly explain
each type and describe any differences between how each form acts and how it can
(a) Malware
attackers with intention of gaining access or causing damage to a computer or network. Often
while the victim remains oblivious to the fact there’s been a compromise. Most malware
infections occur when you inadvertently perform an action that causes the malware to be
website.
(b) Viruses
into another program and becoming part of it. It spreads from one computer to another, while
travelling; it leaves an infection to each computer. The severity of viruses can range from
causing mildly annoying effects to damaging data or software and causing conditions of
denial of service (DoS). Nearly all viruses are attached to an executable file, meaning that the
virus may exist on a system but will not be active or able to spread until the malicious host
file or program is run or opened by a user. The viral code is also executed when the host code
is executed. The host program will normally continue to function after it is infected with the
virus.
(c) Trojans
Another type of malware named after the wooden horse used by the Greeks to
infiltrate Troy is a Trojan. It's a harmful piece of legitimate software. Usually, users are
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
5
fooled into installing and running it on their machines. It can achieve any number of attacks
on the host after it is activated, from irritating the user (popping up windows or changing
desktops) to damaging the host (deleting files, stealing data, or activating and spreading other
malware like viruses). Trojans are also known to create backdoors to provide access to the
system to malicious users. In contrast to viruses and worms, Trojans do not reproduce or self-
replicate by infecting other files. Trojans need to spread through user experiences such as
Social engineering is the term used for a broad range of malicious activities
4. Spam, Phishing, Pharming – what are they and what do they do?
(a) Spam
Spam is the process of sending unsolicited email, social media messages, or instant
messages. These messages are fairly easy to spot and can be damaging when one opens or
responds.
(b) Phishing
people through fraudulent means. An email is sent that looks legitimate and trustworthy
source, the message is meant to lure you into revealing sensitive or confidential information.
(c) Pharming
Pharming is a type of cyber attack that is similar to phishing in that its goals are to
steal sensitive financial and personal information, by gathering usernames and passwords.
They achieve their purpose by automatically redirecting the recipient a fake and malicious
website, as opposed to phishing that tries to manipulate the recipient into accessing them.
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
6
Part 3 Globalization
(a) Search online for statistics about malware incidents by country. Which countries are
other countries[ CITATION Jun18 \l 2057 ]. The table below shows top 10 countries globally
1 Iran 28.31
2 Bangladesh 28.10
3 Algeria 24.77
4 Pakistan 24.00
5 Tanzania 23.07
6 Nigeria 22.69
7 India 21.65
8 Indonesia 18.13
10 Kenya 15.38
Fig. 001 shows the statistical analysis of the most hit countries by the malware.
Examine the other side of the issue to gather statistics about which countries are the
Cybersecurity has become the new ‘in-word’ worldwide as individuals and companies
struggle to protect their information aganist attacks online. With in Cyber threats pose a
exponentially in value and size.Cyber security practices that are constantly evolving have
helped nations like the U.S., Canada, and Australia to be better prepared for cyber attacks,
experts say.On the other hand, as per Akamai technology's Q1 2016 security report, the US–
along with China and Turkey –has also been found to be one of the world's largest source
countries for cyber attacks. Most of these attacks originate in groups or individually from
unknown hackers, the report that are found. Top 10 source countries for malware attacks are
county attacks.
1 China 41
2 United States 10
3 Turkey 4.7
4 Russia 4.3
5 Taiwan 3.7
6 Brazil 3.3
7 Romania 2.8
8 India I
9 Italy 1.6
10 Hungary 1.4
COMPUTER CONCEPTS AND INTERNET TECHNOLOGIES
8
References
Maltoni, D., & Jain, A. K. (2005). Biometric Authentication. Berlin ; London: Springer.