Save this document to your work area. When you have completed it you will upload to your lecturer through the VLE. Your lecturer will demonstrate this in class
Week 2 task 1
Part A – Data Security and internet safety
Use the web links and answer the following questions
1. When you login to the Glasgow Clyde network, why is it important to have a password?
It is important because you don’t want others to being able to access your private files like projects or classwork.
2. What is a computer virus?
A Virus is a piece of malicious code that has the intent to damage your system.
3. Describe 2 types of Computer Virus? Memory Resident Virus is one type, they usually fix themselves inside the computer memory. They get activated every
…show more content…
What is meant by the term Malware? Malware refers to any computer program that is designed to do things that are harmful to or unwanted by a computer's legitimate user.
5. What is meant by the term Spyware? Spyware is Software that enables a user to obtain information about another's computer activities by transmitting data from their hard drive.
6. Describe two threats to yourself and your computer Trojan’s are one threat it is a type of malware designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator.
Another threat is Phishing, it is the fraudulent practice of sending emails pretending to be from reputable companies in order to lure individuals to reveal personal information, such as passwords and credit card numbers.
7. Give 3 examples of good and bad passwords Good Passwords: A11Black$, $nakesonaPlan3, 3ventH0riz0n. Bas Passwords: password, kitty, canthackme
8. Why might you want to clear your computers
…show more content…
How a person’s browsing activity might be tracked? A website places a cookie on your computer to remember certain data so it may run smoother when you return to the site, some government’s collect data to collect data for national security, Google can also collect data to send to marketing companies.
10. What steps might you take to ensure your privacy while browsing? Most browsers have Private browsing, and you can also delete your history to stop others getting access to personal data.
11. How might you know if your financial transactions are secure? Web addresses either begin with http or https. If the address is https, the information you send to it is encrypted and will look like gibberish if intercepted by cybercriminals.
Your browser will use a security symbol or lock to indicate that the browser verifies that the website is a secure site. As seen in the examples below, the look of each browser's symbol can be slightly different, and it is usually located in the address bar.
12. Take the Internet safety quiz and record your score here 7/8 88%
13. List 5 things that you have learnt about computer security
Back up your data on a regular basis to prevent loss of
Computer virus is a program that can copy itself and infect a computer without the permission or knowledge of the user. Viruses perform some type of harmful activity such as accessing private information or corrupting
The new form of criminals that sit behind a desk in slipper and being able to steal personal information by using malware. It may seem unbelievable that your identity can be easily stole from you owe personal computer. One of the best ways to avoid a computer from being infected from a malware is to avoid opening any unfamiliar documents on your computer. Any emails that is unknown delete and do not open.
Malignant + Software = Malware. At the end of the day, malware is the sweeping term to portray programs that can do harm to you or you're PC. The most ideal approach to keep malware from barging in on your life is to see how the diverse sorts of malware work.
Some of the most common ones are Trojan horses, denial of service, e-mail spoofing, e-mail borne viruses and packet sniffing. A Trojan horse is a program that appears legitimate, but performs some illicit activity when it is run. It may be used to locate password information or make the system more vulnerable to future entry or simply destroy programs or data on the hard disk. A Trojan horse is similar to a virus, except that it does not replicate itself. It stays in the computer doing its damage or allowing somebody from a remote site to take control of the computer. Trojans often sneak in attached to a free game or other
Malware- Is a virus, worm, or botnet that attacks a computer in order to harm the computer or the person who owns the device.
These viruses contain their own e-mail server, so that they can replicate by sending email to all mail addresses that they harvest from the system. Worms- An example of a worm is the Blaster worm, which rapidly spread through the Internet in August 2003. Blaster targeted computers running Windows operating systems, and used a vulnerability in Remote Procedure Call (RPC) code. Blaster affected computers running Windows 2003 operating system, Windows NT 4.0, Windows NT 4.0 Terminal Services Edition, Windows 2000, and Windows XP. After compromising hundreds of thousands of systems, Blaster launched a distributed denial of service attack on a Microsoft Windows update site. Trojan horses- As the name implies, these are software programs that are put onto target systems (whether by a direct hack, or as the result of a virus or worm) that have a malicious intent. The Trojan can capture passwords, or provide root access to the system remotely.
Malware has been given different names and definitions. The word Malware is used to describe any form of malicious code also called malcode, malicious software or programs. One common definition of malware is the definition by McGraw and Morrisett (2000), that defines a malware as “any code added, changed, or removed from a software system in order to intentionally cause harm or subvert the intended function of the system.” Vasudevan & Yerraballi (2006) also describe malware as “a generic term that encompasses viruses, trojans, spywares and other intrusive code.” According to Christodorescu et al. (2005) any program that has a malevolent objective is a malware. Malware are generally created to compromise the confidentiality, integrity, or availability of the data/information in a computer system or network.
Malware alters a computer’s operation that is used by hackers to gather sensitive information from unsuspecting companies and individuals. Malware collects passwords, bank information, social security numbers, internet surfing habits, etc. Malware can exist in the form of code, scripts, active content, and other software (“Common Fraud”, n.d.). Malware includes viruses, worms, rootkits, Trojan horses,
There are several common types of cyber-attacks. Malware, for example, is a code with malicious intent that includes cyber threats such as Trojan Horses, viruses, spyware, worms, and other malicious programs; it’s commonly used to damage computer systems or data theft. Users can get malware by installing
Most people download a protective software on their computer to fight against viruses and hackers. There are Youtube videos and step by step videos and diagrams on how to set a virus on a computer. Just clicking on a sketchy web address can ruin a computer. Just like human viruses, there are symptoms for computers with viruses. Slow service, the “screen of death” which is a blue screen that does nothing, programs closing on their own, pop ups, lack of storage and spam. Malware is the software used to commit the crime. Richard Boman explains, “The Morris Worm was one of the earliest viruses and its purpose was to destroy software but other than that did nothing”. Most early viruses were created just to see how much damage could be achieved. Lauren Clark reports, “ Writing a computer virus is an intentional action. It can be an outlet for a rebellious teen nowadays” (Clark).
Along with the development of the Internet, various types of virus developed by hackers are becoming more sophisticated. Take ransomware as an example. It is a type of malware – a very complicated, hard-to-remove virus that restricts access to the computer that it holds
"Malware" is a term coined for software that gets installed on your machine and creates unwanted trouble and unwanted tasks, often for some third party 's benefit. They can be of simple advertising that just annoys us to causing serious computer invasion and damage (e.g., stealing passwords and data or infecting other machines on the network). Additionally, some malware programs are designed to transmit information about your Web-browsing habits to advertisers or other third party interests, unknown to you.
Computer virus is the term that defines a class of programs that illegally explore a wide variety of systems. It is a code, an executable code that is able to reproduce itself. Viruses are an area of programming, and, unlike other programs, they carry knowledge on protection from being hunted down and eliminated. They have to struggle to survive in complex computer systems. Computer viruses reproduce by attaching themselves to a program or computer and using the host's resources to make copies of themselves. Symptoms can range from minor to severe. Computer viruses spread from computer to computer and program to program. There are other computer bugs, such as "worms" that on occasion disrupt networks, and the "Trojan horses" that give a friendly appearance to malignant programs, but viruses are the most common computer pathogen by far.
A computer virus is a malware program that, when executed copies itself into other data files, computer programs, or the boot sector of the hard drive with 95% of viruses doing no more than that. (1)(2). A virus might attach itself to a program such as a word document program. Each time the word document program runs, the virus runs too and it has the chance to reproduce by attaching to other programs. (3) Nowadays, it is extremely important to be aware of viruses because they can cause very dangerous consequences such as identity theft and fraud. When people generally think about computer viruses, they normally think about an attack on a computer system,
Malware is a piece of program that is created with intent of causing harm to the receiver. Malware is also known as malicious software, malicious code and malcode. It contains the harmful intent of an attacker; example the attacker wants to hack into the victim computer to cause a Distributed Denial-Of-Service (DDoS). [5] DDoS attacks are classified into major and minor, with major being difficult to create and minor being easy to create. A simple yet concise idea of how DDoS affects the victim is denying the connection to TCP/IP in which the victim will have no access to the internet.