1. The document provides instructions for answering questions about data security and ethics. It asks to define different types of internet security threats like viruses, phishing, and pharming.
2. Questions are asked to match security issues like pharming, phishing, and viruses to their definitions. Terms related to data security are also defined, including hacking, spyware, cookies, encryption, secure socket layer, proxy server, and denial of service attacks.
3. The document asks how tools like secure socket layer and firewalls can keep data safe during transmission and storage, and what additional security measures a company should take to protect customer data stored on its computer systems.
Hacking 3 Books in 1 A Beginners Guide For Hackers (How To Hack Websites, Smartphones, Wireless Networks) + Linux Basic For... (Julian James McKinnon) - English (Z-Library)
1. The document provides instructions for answering questions about data security and ethics. It asks to define different types of internet security threats like viruses, phishing, and pharming.
2. Questions are asked to match security issues like pharming, phishing, and viruses to their definitions. Terms related to data security are also defined, including hacking, spyware, cookies, encryption, secure socket layer, proxy server, and denial of service attacks.
3. The document asks how tools like secure socket layer and firewalls can keep data safe during transmission and storage, and what additional security measures a company should take to protect customer data stored on its computer systems.
1. The document provides instructions for answering questions about data security and ethics. It asks to define different types of internet security threats like viruses, phishing, and pharming.
2. Questions are asked to match security issues like pharming, phishing, and viruses to their definitions. Terms related to data security are also defined, including hacking, spyware, cookies, encryption, secure socket layer, proxy server, and denial of service attacks.
3. The document asks how tools like secure socket layer and firewalls can keep data safe during transmission and storage, and what additional security measures a company should take to protect customer data stored on its computer systems.
1. The document provides instructions for answering questions about data security and ethics. It asks to define different types of internet security threats like viruses, phishing, and pharming.
2. Questions are asked to match security issues like pharming, phishing, and viruses to their definitions. Terms related to data security are also defined, including hacking, spyware, cookies, encryption, secure socket layer, proxy server, and denial of service attacks.
3. The document asks how tools like secure socket layer and firewalls can keep data safe during transmission and storage, and what additional security measures a company should take to protect customer data stored on its computer systems.
1. Data is valuable. It needs to be kept secure and can easily be
damaged. Give three different ways that data can be easily damaged. [3] 2. Viruses, Phishing and Pharming are examples of internet security issues. Explain what is meant by each of these three terms. [6] 3. Six security issues and six descriptions are shown below. Link each security issue to the correct description
Security Issue Description
a. Pharming illegal access to a computer system without
the owner’s consent or knowledge.
b. Phishing software that gathers information by
monitoring key presses on a user’s keyboard, the data is sent back to the originator of the software.
c. Viruses malicious code installed on the hard drive
of a user’s computer or on a web server, this code will re-direct the user to a fake website without the user’s knowledge. d. Hacking creator of code sends out a legitimate- looking email in the hope of gathering personal and financial information from the recipient; it requires the user to click on the link in the email or attachment.
e. Spyware a message given to a web browser by a web
server, it is stored in a text file; the message is then sent back to the server each time a browser requests a page from the server.
f. Cookies program or code that replicates itself,
designed to amend, delete or copy data or files on a user’s computer; often causes the computer to crash or run slowly.
g. Encryption computer that acts as an intermediary
between a web browser and the internet.
h. Secure Socket Layer scrambles data for secure transmission.
i. Proxy Server provides a secure connection between web
browsers and websites allowing secure transmission of private data. [9]
4. Explain what is meant by a denial of service attack. [2]
5. a) Data is transmitted between offices over the Internet. In order to keep the data safe the company is using Secure Socket Layer (SSL) protocol and a firewall at each office. Explain how SSL protocol and a firewall keep the company’s data safe. [4] b) A company stores personal details of its customers on a computer system behind a firewall. Explain with reasons, what else the company should do to keep this data safe. [6]
Hacking 3 Books in 1 A Beginners Guide For Hackers (How To Hack Websites, Smartphones, Wireless Networks) + Linux Basic For... (Julian James McKinnon) - English (Z-Library)