Professional Documents
Culture Documents
NP000421
• Question No.1(a)
There was an old-time when we have to learn from the teachers with the help of printed
materials like books and other stuff. According to the evolvement of education, we can
describe as follows.
• Question No.1(b)
Here I describe about these systems which helps to secure data from computer criminals.
Audit Trail
An audit trail is a record which shows who accessed the computer system and what
changes or perform had done in the system or network. It is evidence of what operations
had performed at which time. An audit trail is an important feature to secure data from
computer criminal. It is helpful for the recovery of lost data. It is also an important part of
an intrusion detection system. Briefly, we can say that an audit trail is a list of completed
and attempted access. Audit Trail is a record which will generated after each and every
transaction. During recording the information, it categorized the records as When (Time),
Who (Intruder or a Person, User, Transaction Number), How (Process) and What (What
data affected)?
Access Control
Access control is a process in which we have to give permission for certain task and it
defines who can access the computer for what action? Access control system are used to
prevent attacks and misusage of unauthorized access to the computer system. Access
control plays an important role to prevent unauthorized access in a computer system.
Access control gives the ability to restrict, control and monitor in their way and gives
information on what is happening in the system. Access control always enforces the
required security features to access the information. To control the unauthorized access to
the system at the administrative side we can take simple steps like we can make policies
and procedures for computer and network systems mentioning that who can access and
how they can access.
At the technical side, following things are define as Access control.
Protocols
Biometrics or Authentication
Encryption
Smart Card etc.
• Question No.2(a)
Green Computing refers to the usage of the computer system without harming the
environment. We can say green computing helps us to reduce the carbon footprint and
usage of less energy-consuming products. Here are the three major benefits of green
computing towards the environment.
• Question No.2(b)
Worm
Worm is a malicious programmed code which cause damage to the system. Worm is like
a virus but it does not modify the program. Worm is a type of virus which replicates itself
again and again and damage in the performance of computer system. It consumes lots of
computer resources which resulted slow down to the pc and will started to performs slow.
It also uses much more space of hard drive and affect in process of applications. It also
causes major damage on the multiple computers on a same network. It generates
problems on installing antivirus program. Worms are stand along software and do not
need human to spread on the network's computers.
Trojan Horse
Trojan horse is a different virus which doesn't modify computer application and doesn't
replicates itself. Trojan horse is a hidden piece of code which helps to leaking important
information for intruder. It always attached to the software of application which helps
access the computer system in unauthorized way. For e.g. When we attempt to log our
system trojan horse will try to record our credential for access to the computer system.
Trojan steals our data and promotes cyber-attacks.
Public Cloud
Public cloud is a platform which is generally available and easily accessed to the general
public. It gives cloud computing platforms for free of cost so it is available for all. For
e.g. Google gives us mailing services and storage services, Microsoft gives us online app
store services and drop box also a platform where we can store our applications and other
documents. From this model we can get independency of location it means we can
compute our information from any location in the earth. It is less customizable and low
security features due to its availability to the general public.
Private Cloud
It is a cloud services in which system or services are only can access through
Organization only. But it can be managed by third party also. Private cloud has more
security features and privacy features than public cloud. Public cloud is not shareable to
public or person. The resources of cloud are only can access by belonging organization
therefore it is faster than public cloud. It can be accessed by only authorized person or
organization.
Community Cloud
Community Cloud model is a platform in which they allow the system or information
accessible with the group of organizations. It shares its infrastructure and resources
between several organization and community. It can be managed by internally in specific
organization or community. Its is also not shareable to general public so it is secure for
the security of organizational data and their information. It offers same advantage as the
private cloud gives so; it is cost effective than other services for the organization.
Hybrid Cloud
Hybrid cloud service is a mixture of public and private cloud in which some activities are
done in publicly and some are privately according to their requirements. Critical and
important activities are performed using private cloud same as noncritical activities are
performed using public cloud. Therefore, we can say that the combination of both
activities is called as hybrid cloud. This service is cheaper than any other services for
public and private cloud. Because of complexity of both public and private cloud it faces
sometimes network issue and sometimes user have to dependent to the limited
infrastructure.
• Question No.3(a)
The term sustainability refers to the uses of natural resources without damaging so that
next generation can continuously able to use the same resources for a long time. We can
say that it is a term which promotes to using natural resources without any damages to the
environment. We should use ecofriendly product and for less environmental damage.
Sustainability refers to the less usage of Natural resources like Petrol, Diesel, Trees and
Coal etc. It always denotes the continues awareness of impact that human have on the
planet.
Green computing strategies that organizations can apply are as follows.
Power Management
Computer and electronic devices in the organization consume huge amount of power and
energy to perform task. So, the consumption of energy generates huge amount of carbon
Co2 in the environment which is their carbon foot print. Power management is s major
strategies to reduce their carbon foot print. Power management is referring to the
different function like Sleep mode on Pc and computer devices as well as power on in
right time when the computer system has to perform some task. In sleep mode computer
devices use less amount of power which helps to reduce carbon foot print.
Recycle Computer
Recycling of computer and IT related product can reduce huge amount of carbon foot
print. Research shows that huge amount of chemical gases was generated when a PC
produced in the factory. Carbon footprint doesn’t mean only the amount of carbon
produce in manufacturing of product it refers to the amount of carbon produced in their
transportation and all that activities before we get it in our hand. So, recycling of
computer and electronic devices is important for reduction of carbon footprint
• Question No.3(b)
Cookie is a file that has been saved in our computer devices through different browser
which we are using for browsing. When we browse a cookie enabled website like
Amazon, Flipkart and many other online shopping sites our browser will notify us for the
allow or deny of the cookie in the particular website. If we allow to make cookies file to
the computer the websites can store our all the history and search records as well as our
information also like username, id, password etc. According to our search history and our
personal information cookies enabled websites gives us recommendation of different
product and services which match to our search information. Some websites always
enabled cookies to presents their product and services in a good way. Cookies are good
for some factors and it is threat in some factor also.
Cookies enabled websites can stores all the information of our identity like log in
information so that next time the browser can logged in with out any password. But some
Ad and others third-party cookies are threat for the personal information. Some intruder
makes fake cookies to get personal information so that they can fraud in their way. For
example, they can store our banking information and credit card debit card information
which generates risk of misusage of the personal information.
• Question No.3(c)
Digital Signature and Virus signature are two different term which are use in digital
security of our computer devices. We can differentiate the two term as follows.
Virus Signature Digital Signature
Virus Signature is a unique code or Digital Signature is a term which use
algorithm which is used to detect virus mathematical concept and algorithm
in program like antivirus. to verify and validate the authenticity
It is use to detect viruses and malware of program.
in our computer devices and network It is use to authenticate the program
More signature consists of more and give security to the personal
viruses so that virus signature has to information.
be updated in antivirus program. Digital signature effort over public
key cryptography two mutually
authenticating keys.
• Question No.3(d)
Asides from full backup we have following backup option for disaster recovery plan.
Differential Backup
This type of backup has less storage consumption option which takes less time to store
data. Differential backup is several number of backup files which are taken in different
time and situation according to the requirement of organization. This backup is a file
which is backup last time after some changes in full backup. This backup needs more
time in restore of data because of last full backup and differential backup is needed.
Incremental Backup
Incremental backup is a fastest method of backup which records only recent changes in
data and information. This backup also needs minimal space to store. It is also time
consuming at the time of restore because of all incremental backups are needed.
Selective Backup
Selective backup gives us great flexibility of backup options. It records individual
backups of file and consume much more time to restore. It gives flexibility of backup but
difficult to manage all the backup file in computer system. It gives option of which files
bare to be backup and where to be backup.