Professional Documents
Culture Documents
1
identical size. The physical region of memory containing a single page is
called a frame. When paging is used, a frame does not have to comprise a
single physically contiguous region in secondary storage. This approach
offers an advantage over earlier memory management methods, because it
facilitates more efficient and faster use of storage.
Risk analysis defines the review of risks related to the specific action or event.
The risk analysis is used to information technology, projects, security issues
and some other event where risks can be analysed based on a quantitative and
qualitative basis.
There are some steps followed by a risk analysis process are as follows −
2
controls that security those assets. It is the key to recognize all
assets related to the assessment project determined in the scope.
Categorize Potential Losses − It can identify the losses that can
result from some type of damage to an asset. Losses can result from
physical damage, denial of service, alteration, unauthorized access
or disclosure. Losses can be intangible, including the loss of the
organizations’ credibility.
Firewall( 5 mark)
A firewall can be represented as a specific type of network security device or a
software program that monitors and filters incoming and outgoing network
traffic based on a represented group of security rules. It facilitates as a barrier
between inside private networks and outside sources (such as the public
Internet).
Firewalls use multiple methods to control traffic flowing in and out of the
network which are as follows −
3
Packet filtering − Packets (small chunks of data) are analysed
against a group of filters. Packets that create it through the filters
are sent to the requesting system and some discarded.
Proxy service − Information from the Internet is fetched by the
firewall and then sent to the requesting system, etc.
Stateful inspection − A current approach that doesn’t determine
the contents of each packet but instead compares specific key
element of the packet to a database of trusted information.
Types of Threats:
A security threat is a threat that has the potential to harm computer systems and
organizations. The cause could be physical, such as a computer containing
sensitive information being stolen. It’s also possible that the cause isn’t
physical, such as a viral attack.
4
Human: Destroying of infrastructure and/or hardware, thefts,
disruption, and unintentional/intentional errors are among the threats.
2. Non-physical threats: A non-physical threat is a potential source of an
incident that could result in:
Hampering of the business operations that depend on computer
systems.
Sensitive – data or information loss
Keeping track of other’s computer system activities illegally.
Hacking id & passwords of the users, etc.
The non-physical threads can be commonly caused by:
5
Adware is a sort of spyware that is primarily utilized by advertising. When you
go online, it keeps track of your web browsing patterns in order to compile data
on the types of websites you visit.
(iv) Worms: Computer worms are similar to viruses in that they replicate
themselves and can inflict similar damage. Unlike viruses, which spread by
infecting a host file, worms are freestanding programs that do not require a host
program or human assistance to proliferate. Worms don’t change programs;
instead, they replicate themselves over and over. They just eat resources to
make the system down.
(v) Trojan: A Trojan horse is malicious software that is disguised as a useful
host program. When the host program is run, the Trojan performs a
harmful/unwanted action. A Trojan horse, often known as a Trojan, is malicious
malware or software that appears to be legal yet has the ability to take control of
your computer. A Trojan is a computer program that is designed to disrupt,
steal, or otherwise harm your data or network.
Computer Virus 5 mark
There are many antiviruses, which are programs that can help you protect your
machine from viruses. It scans your system and cleans the viruses detected
during the scan. Some of the popular antiviruses include Avast, Quickheal,
McAfee, Kaspersky, etc.
Overwrite Virus:
It is the simplest computer virus that overwrites the code of the host computer
system's file with its own malicious code. The content of the infected file is
6
replaced partially or completely without changing the size of the file. Thus, it
destroys the original program code by overwriting it with its defective code.
The infected files must be deleted or replaced with a new copy as this virus
cannot be removed or disinfected.
Append Virus:
As the name suggests, this virus appends its malicious code to the end of the
host program's file. After that, it alters the file's header in a way that the file's
header is redirected to the start of the malicious code of the append virus. Thus,
this code is executed each time the program runs. However, it does not destroy
the host program; rather, it modifies it in a way that it holds the virus code and
enables the code to run itself.
Macro Virus
The first macro virus, which was named concept, spread through emails with
attached Ms Word documents. It infected MsWord 6.0 and Ms Word 95
documents, which were saved using Save As option. Fortunately, it did not
cause any harm, except for displaying a message on the screen.
Boot Virus
Boot virus or boot sector virus alters the boot sector program stored in the hard
disk or any other storage device such as floppy disks. It replaces the boot sector
program with its own malicious version. It infects the computer only when it is
used to boot up the computer. If it enters after the boot-up process, it will not
infect the computer. For example, if someone forgets to remove the infected
floppy disk when the pc is turned off and then turns on this pc, it runs the
infected boot sector program during the booting process.
Usually, it enters into your system through corrupt media files, infected storage
devices, and insecure computer networks. The spread of this virus is very rare
these days due to the decline in the use of floppy disk and use of boot-sector
safeguards in the present-day operating systems.
7
Resident Virus
The resident virus stays permanently in the primary memory (RAM) of the
computer. When you start the computer, it becomes active and corrupts the files
and programs running on the computer.