Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

INSTITUTE OF BUSINESS MANAGEMENT

Page 1
INSTITUTE OF BUSINESS MANAGEMENT

QUESTION NO 1:
Define the following terms:

a) Hacker
b) Virus
c) Jammer
d) Spoofer
e) Sniffing
f) Malicious software

ANSWER NO 1
Hacker
Hacker is a term used by some to mean "a clever programmer" and by others, especially those in
popular media, to mean "someone who tries to break into computer systems."

Virus
A program or piece of code that is loaded onto your computer without your knowledge and runs against
your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus
that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus
is dangerous because it will quickly use all available memory and bring the system to a halt. An even
more dangerous type of virus is one capable of transmitting itself across networks and bypassing security
systems.

Jammer
In cell phone terminology, a jammer is a device that blocks transmissions by creating interference. The
jammer emits signals in the same frequency range that cell phones uses, and within the range of a
jammer a cell phone user may lose their signal. In satellite terminology it is a mobile ultrahigh-frequency
(UHF) high-power noise source that can be used to jam satellite antennas or receivers.

Spoofer
Similar to a hacker, but the things a spoofer does are completely legal and don't harm anything in any
way. Usually appear in online game lobbies on systems that run on separate software, like battle.net

Sniffing
A program or device that captures vital information from the network traffic specific to a particular
network.

Malicious software
Malicious software (malware) is any software that gives partial to full control of your computer to do
whatever the malware creator wants. Malware can be a virus, worm, trojan, adware, spyware, root kit,
etc. The damage done can vary from something slight as changing the author's name on a document to

Page 2
INSTITUTE OF BUSINESS MANAGEMENT

full control of your machine without your ability to easily find out. Most malware requires the user to
initiate it's operation. Some vectors of attack include attachments in e-mails, browsing a malicious
website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the
operating system or programs. Malware is not limited to one operating system.
Malware types can be categorized as follows: viruses, worms, trojans, and backdoors seek to infect and
spread themselves to create more havoc. Adware and spyware seek to embed themselves to watch
what the user does and act upon that data. Root kits seek to give full access of your machine to the
attacker to do what they want.

QUESTION NO 2

What is the difference between SPYWARE and ADWARE

ANSWER NO 2
DESCRIPTION SPYWARE ADWARE

Installation Stage Adware will clearly show its Spyware will not show its
presence during the presence during the
installation stage. installation stage.

Uninstall Adware programs will be Spyware programs will


less difficult to uninstall. normally be more difficult to
uninstall.

Definition Adware or advertising- Spyware software


supported software is any applications are programs
software package which that are embedded to
certain websites in order to
automatically plays,
track the purchasing habits
displays, or downloads of existing customers.
advertising material to a
computer after the software
is installed on it or while the
application is
being used.

Purpose Application that is designed The spyware gathers the


to allow a number of pop up purchase information and
advertisements straight to stores it in a database to
allow the company to keep
the personal computers of
track of the types of the
potential customers and products and services that
clients. These a particular client avails and

Page 3
INSTITUTE OF BUSINESS MANAGEMENT

advertisements allow the frequency of the


Internet browsers to purchases made.
download certain programs
free of charge since these
pop up advertisements
contribute to the payment of
the use of these programs.

QUESTION NO 3

Write a detailed note on FIREWALL?

ANSWER NO 3

DEFINITION:
A firewall is a set of related programs, located at a network gateway server, that protects the resources
of a private network from users from other networks. An enterprise with an intranet that allows its
workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own
private data resources and for controlling what outside resources its own users have access to.

Basically, a firewall, working closely with a router program, examines each network packet to determine
whether to forward it toward its destination. A
firewall also includes or works with a proxy
server that makes network requests on behalf of
workstation users. A firewall is often installed in
a specially designated computer separate from
the rest of the network so that no incoming
request can get directly at private network
resources.

There are a number of firewall screening


methods. A simple one is to screen requests to
make sure they come from acceptable domain
name and Internet Protocol addresses.

Page 4
INSTITUTE OF BUSINESS MANAGEMENT

A number of companies make firewall products. Features include logging and reporting, automatic
alarms at given thresholds of attack, and a graphical user interface for controlling the firewall.

Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a
barrier established to prevent the spread of fire.

There are several types of firewalls techniques /components:

a) Packet filters: Looks at each packet entering or leaving the network and accepts or rejects it based
on user- defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to
configure. In addition, it is susceptible to IP spoofing.

b) Application gateway: Applies security mechanisms to specific applications, such as FTP and
Telnet servers.

c) Circuit-level gateway: Applies security mechanisms when a TCP or UDP connection is


established. Once the connection has been made, packets can flow between the hosts without
further checking.

d) Proxy server: Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.

e) Function: A firewall's function within a network is similar to physical firewalls with fire doors in
building construction. In the former case, it is used to prevent network intrusion to the private
network. In the latter case, it is intended to contain and delay structural fire from spreading to
adjacent structures.

f) Network layer and packet filters: Network layer firewalls, also called packet filters, operate at a
relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall
unless they match the established rule set. The firewall administrator may define the rules; or
default rules may apply

There are two types of firewalls

•Standalone Hardware Firewalls.


•Software-Based Firewalls.

Hardware Firewalls :Standalone


hardware firewalls are computer
network devices built specifically for
firewall purposes. They are typically
designed to be used in large
computer networks, such as those
large computer networks, found at
universities or businesses.

Page 5
INSTITUTE OF BUSINESS MANAGEMENT

Standalone Hardware Firewalls are typically administered by a direct serial typically a connection
between the firewall and a simple text - based terminal computer. Hardware firewalls can be great for
large networks, they may not be practical when only a few computers need to be secured.

Software Based Firewalls: Software based firewalls perform the same functions as hardware –
based firewalls. But instead of working as standalone devices on the network, they run on computers
connected to the network. Norton Personal Firewall, BlackIce, Zonealarm are the few examples of
Software Firewall.

Page 6
INSTITUTE OF BUSINESS MANAGEMENT

Page 7

You might also like