Professional Documents
Culture Documents
Assignment Is
Assignment Is
3. CompTIA Security+
CompTIA is a respected authority in the cybersecurity industry, offering various certifications to
support growth in cybersecurity careers and education. The CompTIA Security+ certification is a
great certificate in cybersecurity for IT professionals just starting in the security field. The exam
covers a wide range of topics, like cyber attacks, incident response, architecture and design,
governance and compliance, risk management, and cryptography.
Offered by (ISC)2, this certification ensures you’re equipped with advanced technical skills to
implement, monitor, and administer IT infrastructure using best security practices, procedures,
and policies established by cybersecurity experts. Some topics this certification deems you
competent in include security administration, application security, incident response, and risk
identification.
Q2.
Part 1
1. The roll of internet The internet is a universal technology platform that allows any
computer to communicate with any other computer in the world. Furthermore, one of
the advantages of the internet is that nobody really ‘owns’ it. It is a global collection of
networks, both big and small. These networks connect together in many different ways
to form the single entity that we know as the internet.
2. The internet has revolutionized communication and thereby its contribution to
information sharing. With access to a computer and an appropriate connection, anyone
can interact with others worldwide; however the web is designed to exchange
unstructured information: while people can read web pages and understand their
meaning, computers cannot.
Web services play a complementary and dominant role in building global IS for today’s dynamic
business world. Web services are self-contained, modular applications that can be described,
published, located and invoked over a network.
Web services perform functions ranging from simple requests to complicated business
processes. Once a web service is developed, other applications and other web services can
discover and invoke the deployed service through universal description, discovery and
integration. The idea of web service is to leverage the advantages of the web as a platform to
apply it to the application services. We use them, not just to the static information.
Web services tools are available for most computer systems, including mainframes and
packaged applications. This means that not only the existing applications can be retained, but
also the existing knowledge of staff can be applied and extended using web services for
business integration.
Web services are adaptable and can handle changes ore readily than other integration
solutions, because they use structured text as their message format.
Part 2
Security threats can cause significant and irreparable damage to the finances and reputation
of an organization. No company should take these threats lightly. It only takes one
vulnerability or lapse to destroy everything a business worked hard to build from the ground
up.
Ransomware
Ransomware is digital extortion, a form of malware from cryptovirology that hackers
execute and encrypt to perfection once they have established a presence in your network.
They steal vital corporate data or sensitive personal information of clients and then threaten
the victim organizations to compromise these data unless the company pays a ransom.
Phishing
Phishing is one of the essential means of cybercriminals in hacking a system. It is the
gateway to other advanced security threats such as ransomware and Distributed Denial of
Service (DDoS).
Trickery is the primary element of phishing. Digital attackers craft email blasts that make it
appear as though it originated from a legitimate source. Unknowingly clicking through these
attachments or links can infect a computer and its network.
Botnet
A botnet is a portmanteau that refers to both “robot” and “network.” It is a collective term for
private computers suffering infestations from malware, making them vulnerable to remote
access by cybercriminals without the organization’s knowledge.
Q3.
The sensor interoperability issues may arise when a biometric sensor is replaced without
recapturing the corresponding templates. Interoperability is how system works when
different set of devices are used.