You are on page 1of 6

Name=Sushil Poudel Roll No.

NP000421

• Question No.1(a)
There was an old-time when we have to learn from the teachers with the help of printed
materials like books and other stuff. According to the evolvement of education, we can
describe as follows.

 Traditional Education Model


Traditional Education refers to the classrooms education in which we have to learn from
teachers with the help of printing media like books, newspaper, magazine etc. Several
years ago, there were not allowed to bringing any digital media like mobile phones,
laptop and tablets in the classrooms. In the traditional education system, we have
individual attention and interaction with the professor. We cannot grab any extra
knowledge more than the professor. We should attend a class compulsory for getting
knowledge about what we want to learn.

 Today's Education Model


Nowadays time has been changed, the schools and college are into our smartphones.
Modern education is a Network or computer-based education in which we can learn with
the help of digital media like the computer, mobile phones, tablets any many more
gadgets. If we have self-discipline, we can learn much more with the help of these
things. Modern Education always teaches skills that are required today and that skills are
about personality development, Science and technology and medical science etc.

• Question No.1(b)
Here I describe about these systems which helps to secure data from computer criminals.

 Intrusion Detection Software


An intruder is an unauthorized person in a particular network whose aim is to fraud with
the help of their access to data. We can say intrusion as unauthorized access to the
information by an intruder. It is a misusage of the computer system. Intrusion detection
software is a system which detects an intruder whether it is inside or outside. It monitors
our system or network continuously and detects an intrusion. This detection software
detects whether anyone is misusing of access to the network or leaking of internal
information. This detection system always runs in the backend of the computer system. It
gives an alert signal when it detects any suspicious activities in the network. So, it is very
important for the network system.

 Audit Trail
An audit trail is a record which shows who accessed the computer system and what
changes or perform had done in the system or network. It is evidence of what operations
had performed at which time. An audit trail is an important feature to secure data from
computer criminal. It is helpful for the recovery of lost data. It is also an important part of
an intrusion detection system. Briefly, we can say that an audit trail is a list of completed
and attempted access. Audit Trail is a record which will generated after each and every
transaction. During recording the information, it categorized the records as When (Time),
Who (Intruder or a Person, User, Transaction Number), How (Process) and What (What
data affected)?

 Access Control
Access control is a process in which we have to give permission for certain task and it
defines who can access the computer for what action? Access control system are used to
prevent attacks and misusage of unauthorized access to the computer system. Access
control plays an important role to prevent unauthorized access in a computer system.
Access control gives the ability to restrict, control and monitor in their way and gives
information on what is happening in the system. Access control always enforces the
required security features to access the information. To control the unauthorized access to
the system at the administrative side we can take simple steps like we can make policies
and procedures for computer and network systems mentioning that who can access and
how they can access.
At the technical side, following things are define as Access control.
 Protocols
 Biometrics or Authentication
 Encryption
 Smart Card etc.

• Question No.2(a)
Green Computing refers to the usage of the computer system without harming the
environment. We can say green computing helps us to reduce the carbon footprint and
usage of less energy-consuming products. Here are the three major benefits of green
computing towards the environment.

 Reduce Carbon Footprint


Green Computing is important in IT industries to reduce the carbon footprint generated
by the computer system and data centers, government offices, business organizations etc.
Carbon footprint is the amount of carbon dioxide (Co2) generated in the atmosphere due
to IT and other activities. Green computing refers to non-polluting activities. When we
use less energy and consume as possible as less power there will be a chance of less
Carbon Dioxide production from IT-related industries. When we use any kind of energy
sources, they generate carbon in the environment. Our carbon footprint is a sum of all
emission of carbon from our daily activities. Therefore, Green computing is one of the
important steps of reducing carbon footprint from our side.
 Saves Money
Green computing refers to less energy consumption while using daily activities. As we
know saving energy means reducing the source of energy and it saves money. It always
reduces the cost of energy with less consumption. For example: When we consume less
petrol and diesel for Car or Bike, we save our money from it and When we consume less
electricity, we have to pay less amount of money for electricity what we used. Energy can
be saved by turning on power management system in our computer, Using energy star
products etc.

 Reduce Chemical Risks


By the different gases like carbon dioxide (Co2) produced from the energy consumption
product will cause different types of diseases like Cancer, Nerve damage and immune
reaction. So green computing always reduces the risk of these kinds of diseases due to
low production of carbon gas in the atmosphere. It reduces chemical risks of gases and
helps us to live healthier lives.

• Question No.2(b)
 Worm
Worm is a malicious programmed code which cause damage to the system. Worm is like
a virus but it does not modify the program. Worm is a type of virus which replicates itself
again and again and damage in the performance of computer system. It consumes lots of
computer resources which resulted slow down to the pc and will started to performs slow.
It also uses much more space of hard drive and affect in process of applications. It also
causes major damage on the multiple computers on a same network. It generates
problems on installing antivirus program. Worms are stand along software and do not
need human to spread on the network's computers.

 Trojan Horse
Trojan horse is a different virus which doesn't modify computer application and doesn't
replicates itself. Trojan horse is a hidden piece of code which helps to leaking important
information for intruder. It always attached to the software of application which helps
access the computer system in unauthorized way. For e.g. When we attempt to log our
system trojan horse will try to record our credential for access to the computer system.
Trojan steals our data and promotes cyber-attacks.

 Denial of Service Attacks (DoS)


Denial of service Attacks is a malicious attempt to the server to make resources
unavailable to the users. This is not a programming-based attacks it is a process done by
intruder for hacking any particular websites of computer system. In this process the
hacker sends lots of request to the server for slow down the server and make resources
unavailable to the normal users. Dos attacks means that one computer and one internet
connection is being used to flood a website/server with data packets. Dos Attacks intend
to overload the targeted websites bandwidth and other resources.
• Question No.2(c)
Cloud computing is an environment which creates resources to computing over the
internet and Deployment model defines the types of access to the cloud. Here are the
four-deployment model of cloud computing.

 Public Cloud
Public cloud is a platform which is generally available and easily accessed to the general
public. It gives cloud computing platforms for free of cost so it is available for all. For
e.g. Google gives us mailing services and storage services, Microsoft gives us online app
store services and drop box also a platform where we can store our applications and other
documents. From this model we can get independency of location it means we can
compute our information from any location in the earth. It is less customizable and low
security features due to its availability to the general public.

 Private Cloud
It is a cloud services in which system or services are only can access through
Organization only. But it can be managed by third party also. Private cloud has more
security features and privacy features than public cloud. Public cloud is not shareable to
public or person. The resources of cloud are only can access by belonging organization
therefore it is faster than public cloud. It can be accessed by only authorized person or
organization.

 Community Cloud
Community Cloud model is a platform in which they allow the system or information
accessible with the group of organizations. It shares its infrastructure and resources
between several organization and community. It can be managed by internally in specific
organization or community. Its is also not shareable to general public so it is secure for
the security of organizational data and their information. It offers same advantage as the
private cloud gives so; it is cost effective than other services for the organization.

 Hybrid Cloud
Hybrid cloud service is a mixture of public and private cloud in which some activities are
done in publicly and some are privately according to their requirements. Critical and
important activities are performed using private cloud same as noncritical activities are
performed using public cloud. Therefore, we can say that the combination of both
activities is called as hybrid cloud. This service is cheaper than any other services for
public and private cloud. Because of complexity of both public and private cloud it faces
sometimes network issue and sometimes user have to dependent to the limited
infrastructure.
• Question No.3(a)
The term sustainability refers to the uses of natural resources without damaging so that
next generation can continuously able to use the same resources for a long time. We can
say that it is a term which promotes to using natural resources without any damages to the
environment. We should use ecofriendly product and for less environmental damage.
Sustainability refers to the less usage of Natural resources like Petrol, Diesel, Trees and
Coal etc. It always denotes the continues awareness of impact that human have on the
planet.
Green computing strategies that organizations can apply are as follows.

 Power Management
Computer and electronic devices in the organization consume huge amount of power and
energy to perform task. So, the consumption of energy generates huge amount of carbon
Co2 in the environment which is their carbon foot print. Power management is s major
strategies to reduce their carbon foot print. Power management is referring to the
different function like Sleep mode on Pc and computer devices as well as power on in
right time when the computer system has to perform some task. In sleep mode computer
devices use less amount of power which helps to reduce carbon foot print.

 Recycle Computer
Recycling of computer and IT related product can reduce huge amount of carbon foot
print. Research shows that huge amount of chemical gases was generated when a PC
produced in the factory. Carbon footprint doesn’t mean only the amount of carbon
produce in manufacturing of product it refers to the amount of carbon produced in their
transportation and all that activities before we get it in our hand. So, recycling of
computer and electronic devices is important for reduction of carbon footprint

• Question No.3(b)
Cookie is a file that has been saved in our computer devices through different browser
which we are using for browsing. When we browse a cookie enabled website like
Amazon, Flipkart and many other online shopping sites our browser will notify us for the
allow or deny of the cookie in the particular website. If we allow to make cookies file to
the computer the websites can store our all the history and search records as well as our
information also like username, id, password etc. According to our search history and our
personal information cookies enabled websites gives us recommendation of different
product and services which match to our search information. Some websites always
enabled cookies to presents their product and services in a good way. Cookies are good
for some factors and it is threat in some factor also.
Cookies enabled websites can stores all the information of our identity like log in
information so that next time the browser can logged in with out any password. But some
Ad and others third-party cookies are threat for the personal information. Some intruder
makes fake cookies to get personal information so that they can fraud in their way. For
example, they can store our banking information and credit card debit card information
which generates risk of misusage of the personal information.

• Question No.3(c)
Digital Signature and Virus signature are two different term which are use in digital
security of our computer devices. We can differentiate the two term as follows.
Virus Signature Digital Signature
 Virus Signature is a unique code or  Digital Signature is a term which use
algorithm which is used to detect virus mathematical concept and algorithm
in program like antivirus. to verify and validate the authenticity
 It is use to detect viruses and malware of program.
in our computer devices and network  It is use to authenticate the program
 More signature consists of more and give security to the personal
viruses so that virus signature has to information.
be updated in antivirus program.  Digital signature effort over public
key cryptography two mutually
authenticating keys.

• Question No.3(d)
Asides from full backup we have following backup option for disaster recovery plan.

 Differential Backup
This type of backup has less storage consumption option which takes less time to store
data. Differential backup is several number of backup files which are taken in different
time and situation according to the requirement of organization. This backup is a file
which is backup last time after some changes in full backup. This backup needs more
time in restore of data because of last full backup and differential backup is needed.

 Incremental Backup
Incremental backup is a fastest method of backup which records only recent changes in
data and information. This backup also needs minimal space to store. It is also time
consuming at the time of restore because of all incremental backups are needed.

 Selective Backup
Selective backup gives us great flexibility of backup options. It records individual
backups of file and consume much more time to restore. It gives flexibility of backup but
difficult to manage all the backup file in computer system. It gives option of which files
bare to be backup and where to be backup.

You might also like