Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

“03 Laboratory Exercise 1 Information Assurance and Security (Data Privacy)”

Members:

Falsario, Reeco Noe Pesario, Meka Ella Tarrazona


Ferolin, Jacqueline Serna, Maria Julia Belen
Fernandez, Julie Ann Taculod, Liam Jessie

What is the article all about? Summarize the article in at least seven (7)
sentences.

The article by Hassan, N. is essentially about the potential risks we face when we go online
and how cyber threats have evolved over time. It explains that threats can range from damaging
your operating system to stealing your credentials and even tracking your online activities. These
threats are categorized into two main types: active and passive attacks. Passive attacks involve
monitoring a system and network communications, scanning for vulnerabilities, and collecting
information without altering data. On the other hand, active attacks use the information
gathered during a passive attack to compromise a user or network, modifying the intercepted
information to gain access or privileges. The article emphasizes that everyone is a potential target
online and that changing attitudes and understanding this is crucial to preventing cyberattacks.

Compare and contrast active and passive attacks.


Comparing active and passive attacks, both involve a breach of security, but they differ in
their approach and impact. Passive attacks are more about surveillance, where the intruder
monitors and collects information without the user's knowledge. They are hard to detect as they
don't involve any data alteration. Active attacks, however, are more intrusive. They involve the
hacker actively trying to gain unauthorized access and modify the integrity and availability of the
information. These attacks are usually more noticeable but the root cause can be hard to
determine.

What are your recommendations to prevent these attacks?


As for our recommendations to prevent these attacks, I'd say the first step is awareness.
Understand that anyone can be a target and take steps to protect yourself. Use encryption
techniques to scramble messages and make them unreadable to unintended recipients. Be
cautious about what information you share online, avoid posting sensitive information publicly.
Regularly update your system and applications to patch any security vulnerabilities. Also,
consider using a firewall or other security tools to monitor and control incoming and outgoing
network traffic. Lastly, educate yourself and others about the signs of these attacks and how to
respond to them. Remember, prevention is better than cure.

You might also like