Q1. Describe the concept of data confidentially.
Data confidentiality is one of the three main IT security components which are data confidentiality, integrity, and availability (CIA). To keep your data confidential means to protect your data from unauthorized access. In other words, sensitive data are stored in a protected system that keep these information and data away from attackers and here the data confidentiality will measure the ability of the system to protect its data.
a. What is the negative result of the loss of data confidentially? the loss of data confidentiality is a huge risk and affect negatively to any business. The common term used for that is data breach. The most important factors at any business even small business are
…show more content…
Another example from our personal life which is bank transactions.
Q2. Viruses are a constant threat. Describe briefly how virus protection software works, and why it can never be 100% effective.
As we know virus protection software is a code written by one of the programing languages that we know. This code works as a search engine looking for infected files in the entire system or specific locations on the system. The idea depends on two important factors which are, search engine and viruses’ data base. The following scenario explains how people get viruses and how virus protection software works.
Let’s say user (A) download an execution file (EXE) on his-her PC and double click on that file, if this file is infected the virus works based on the written code by the hacker/ attacker/ intruder and copy some files into the system. In case, user (A) does not have virus protection, the virus works perfect in destroying that computer or sending information from this computer to the attacker email. Viruses not only designed to destroy PC’s, but also designed to get information from
…show more content…
Authentication factors could be classified into four factors which are, factors that users never forget, factors that people use to get access, factors that people have on their body, and the location. To explain more, multifactor authentication is recommended because of the security incidents these days. The worst factor that I used in my life is password because it does provide less security and anyone could guess passwords. Right now, I am using passphrases even in my social media accounts. Another example is the PIN number at the ATM machine, it provides security but sometimes not active because of the scammers. Mobile applications help a lot in our life and some application have security roles that ensures the security and privacy. Biometric is another important method in protection using fingerprint is the most common way. Finally, getting the location of the user is an important method for security, a good example is location services in the phone or
1. Workstation and desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organizations implement to help mitigate the risk from viruses, malware, and malicious software?
3.) Why is it a best practice to have and to carry an anti-virus boot-up disk or CD?
Memory Resident Virus is one type, they usually fix themselves inside the computer memory. They get activated every
2. When an antivirus application identifies a virus and quarantines this file, does this mean the computer is free of the virus and any malicious software?
Anti-virus software was designed to run a specific job of protecting a user’s computer system from any threats obtained from the internet or even files that may be downloaded of the internet or any external source. How it work is by a number of ways first by shielding itself, normally starting off with an anti-virus firewall, so it scans files eliminates threats and informs you if a website is safe or not. The software would need to connect with the main server through the internet, so to be able to gain information of any new viruses that are brand new to be able to protect your computer system. If the anti-virus software doesn’t receive an update about any new viruses then the software
Computer viruses have been around just about as long as the personal computer has existed. With the advent of the Internet, the ability of viruses to rapidly spread has increased substantially. Despite this increase in capability to infect large numbers of computers across international borders, the definition of a computer virus has not substantially changed over
Don't leave papers, computers or other electronic devices visible in an empty car or house.
These days, there are thousands of different viruses and malware on Internet. Like the writers of viruses and other malicious code are many and diverse, and their reasons and motives that drive people to create a virus are as wide-ranging as themselves.
A virus is a software program that is designed to replicate between computers and affect the operation of the computer. A computer virus is similar to a human virus. A virus is a software program that is able to corrupt and delete data from the computer. The virus can be transferred from one pc to another through an email as an attachment.
Computer viruses are minute program which is “embedded inside an application or within a data file which can copy itself into another program“(Adams et al, 2008 ) for the sole determination of meddling with normal computer operations. The consequences may range from corruption and deletion of data; propagation of virus on to network and deployment through attachments through emails in order to further creating havoc to all associated computing devices.
One of the most well-known types of malware among the general public is a virus. A computer virus is malicious software that infects a computer and then makes copies of itself, much like a biological virus. Before, viruses were spread through the use of floppy disks or USB flash drives. Nowadays, they are mainly spread through emails. Many phishing emails lead to webpages that download a virus onto the computer hardware. Viruses can corrupt computer files, making the computer unusable (Department of Homeland Security).
To understand the business of malware, one must understand how malware has evolved in the past twenty-five years. Malware, which includes all kinds of malicious software, was originally created to show the weaknesses of computers. The first type of malware, created in 1986, was a virus called “Brain.A. Brain.A was developed in Pakistan, by two brothers - Basit and Amjad. They wanted to prove that PC is not secure platform, so they created virus that was replicating using floppy disks” (Milošević). Even today malware is still used to check the security of machines.
There are an enormous amount of malicious software programs. The most common types are known as viruses and spyware. Spyware has
A computer virus is Program or a portion of the codes that enter into the computer to target vandalism and characterized by their ability to copy itself to many copies and their ability to move from place to place and from computer to computer, disappearances and contents cover.
These are computer programs designed to spread it from computer to computer like a disease and interfere with the computer operation. If a virus gets into your computer, they can delete all your data, send emails without your permission and even communicate personal and sensitive information to criminals. It can usually spread in one of three ways; from removable media, Internet downloads and email attachments.