Professional Documents
Culture Documents
Briefly Define The Following Security Terms (2 Mark)
Briefly Define The Following Security Terms (2 Mark)
◦ The list our things that is allows the legitimate actor could have in the given
system
2. Write a simple security policy for your personal device, stating who has
authorized access (2 Mark).
A. The only person who has access to my personal computer is only me.
A worm is like a virus except that it propagates by itself without theneed for outside assistance.
This definition implies that a worm uses a
network to spread its infection
b. Hacker vs Cracker
Hackers:-is a computer expert who uses their technical knowledge to achive a goal or overcome
an obstacle ,within a computerized system by non-standard means.
Crackers:- when someone perform a security hack for criminal or malicious reasons ,and the
person is called a “cracker ” just like a bank robber crackers a safe by skillfully manipulating it
lock ,a cracker break into a computer system ,program or account with the aid od their technical
wizardry
c. Phishing vs Pharming
Phishing:-is a type of social engineering where ama attacker sends a fraudulent (“spoofed ”)
message designed to trick a human victim into reveling sensitive information.
Pharming:-is a form of online fraud involving malicious code and fraudulent websites.
Cybercriminal install malicious code on your computer or sever. The code automatically directs
you to bogus website without your knowledge or consent
d. DoS vs DDoS
Dos:- (Denial of service) is a cyber-attacker in which the perpetrator seeks to make a machine or
network resource unavailable to its intended users by temporary or indefinitely disrupting
service of a host connected to the internet
DDOS:-attacks target websites and online service .The aim is to overwhelm them with more
traffic than the server or the network can accommodate. The goal is to render the website or
service inoperable…. In some case , the targeted victims are threatened with DDOS attacker at
attack at a low level.