StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Protecting against Serious Threats against Computer Systems and Networks - Assignment Example

Cite this document
Summary
The author of the paper "Protecting against Serious Threats against Computer Systems and Networks" states that we are no longer safe in this world we live in. There is always one person out there waiting to attack us in any way possible. Even our computer systems are no longer safe…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful

Extract of sample "Protecting against Serious Threats against Computer Systems and Networks"

Figure 1: Question 5 How the task was done: The drawing was first done in AutoCAD. Drawing tools: lines, circles, rectangles, hatches, text and dimensions were used in combination to produce the drawing. Modify commands also came in quite handy in editing the draw commands appropriately. To paste the drawing from AutoCAD into Ms Word, the system-wide copy command is used to copy the drawing into the clipboard, and then pasted into Word. However, using the paste command directly would paste it as a link to the original AutoCAD drawing, therefore Paste Special command is used. Using Paste Special command, the drawing can be pasted into the Word document as a Picture (Enhanced Metafile) The original scale as done in AutoCAD is kept in place only as long as the drawing is pasted without tampering with the aspect ratio of the image. QUESTION 1 COMPUTER THREATS AND HOW THEY REMOVED We are no longer safe in this world we live in. There is always one person out there waiting to attack us in anyway possible. Even our computer systems are no longer safe. Vital information can be stolen in an instant from our government, which could be sold over the black market to terrorist organizations who could potentially use that information against us and possibly destroy the back bone of this fine country. We must stop these ruthless acts against our computers systems and say no more! The CompTIA organization has created a helpful certification to help IT professionals get in the game to help protect our computer systems. They created Security+ to help protect against serious threats against computer systems and networks. “Theft and destruction of intellectual property takes place despite the presence of firewalls, encryption and corporate edicts. Neither technologies nor policies alone offer effective information security. The IT industry must have a well-trained work force to effectively combat hackers and decrease. In the past decade, computer and networking technology has seen enormous growth. This growth however, has not come without a price. With the advent of the "Information Highway", as its coined, a new methodology in crime has been created. Electronic crime has been responsible for some of the most financially devastating victimizations in society. In the recent past, society has seen malicious editing of the Justice Department web page (1), unauthorized access into classified government computer files, phone card and credit card fraud, and electronic embezzlement. All these crimes are committed in the name of "free speech." These new breed of criminals claim that information should not be suppressed or protected and that the crimes they commit are really not crimes at all. What they choose to deny is that the nature of their actions are slowly consuming the fabric of our country's moral and ethical trust in the information age. Federal law enforcement agencies, as well as commercial computer companies, have been scrambling around in an attempt to "educate" the public on how to prevent computer crime from happening to them. They inform us whenever there is an attack, provide us with mostly ineffective anti-virus software, and we Scanners and disinfectors, the most popular classes of anti-virus software, rely on a great deal of a prior knowledge about the viral code. Scanners search for "signature strings" or use algorithmic detection methods to identify known viruses. Disinfectors rely on substantial information regarding the size of a virus and the type of modifications to restore the infected file's contents. Viruses are currently designed to attack single platforms. A platform is defined as the combination of hardware and the most prevalent operating system for that hardware. As an example, a virus can be referred to as an IBM-PC virus, referring to the hardware, or a DOS virus, referring to the operating system. "Clones" of systems are also included with the original platform. "Social engineering" is the final method of gaining unauthorized system access. People have been known to call a system operator, pretending to be some authority figure, and demand that a password be changed to allow them access. One could also say that using personal data to guess a user's password is social engineering. \ A file virus attaches itself to a file, which is usually an executable application (e.g. a DOS program or a word processing program). Generally, file viruses don't infect data files. But, data files can contain embedded executable code such as macros, which can be exploited by computer virus or Trojan horse authors. Recent versions of Microsoft Word and Excel are particularly vulnerable to this type of threat. Text files such as batch files, postscript files, and source codes that contain commands which can be compiled or interpreted by another program are potential targets for malware (malicious software). Boot sector viruses modify the program which is in the first sector (boot sector) of every DOS-formatted disk. In general, a boot sector infector executes its own code (that normally infects the boot sector or partition sector of the hard disk), then continues the PC boot up (start-up) process. In most cases, all write-enabled floppy disks which are used in that PC from then on will become infected. Multipartite viruses have some of the features of both the above types of viruses. When an infected file is executed, it typically infects the hard disk boot sector or partition sector, and therefore infects subsequent floppy disks which are used or formatted in the target system. Computer viruses: The threat today and the expected future. Many of these types of viruses related to DOS programs were commonly found several years ago when DOS programs were mainly used in the computers, but are rarely found and reported now a days. Typically macro viruses infect global settings files such as Microsoft Word, Excel templates so that subsequently edited documents are infected with the infective macros. Macro viruses will be discussed in more details at next section. Stealth viruses are the viruses that go to some length to hide their presence from programs that might notice. Polymorphic viruses are the viruses that cannot be detected by searching for a simple, single sequence of bytes in a possibly infected file, because they change with each replication. Companion viruses are the viruses that spread through a file that runs instead of the file the user intended to run, and then runs the original file. For example, the file MYAPP.EXE may be 'infected' by creating a file called MYAPP.COM. Because of the way DOS works, when the user types MYAPP at the C> prompt, MYAPP.COM is run instead of MYAPP.EXE. MYAPP.COM runs its infective routine, and then quietly executes MYAPP.EXE. N.B. this is not the only type of companion (or 'spawning') virus. A more modern way to achieve this is to create files that have the same name, but are placed on another branch in the file tree. If the file is cleverly placed, failure to write the full path will result in executing the false file. Armored viruses are the viruses which are specifically written to make it difficult for an anti-virus researcher to find out how they work and what the QUESTION 4 The line graph above represents trigonometric functions. First the values of x were tabulated and the range was 0 ≤ x ≤ 10 for intervals of 0.1 in a MS Excel book. In cells adjacent to the value of x, appropriate formulas were inserted. For f1(x), the formula was as follows: =5*(SIN (2*A3))/(2*(A3+1)) For f2(x), the formula was as follows: =COS (2*A3)*EXP(-A3/4) For f3(x), the formula was as follows: =TANH (A3/2)*SIN (2*A3) The value A3 was the cell containing the value of x referenced in the formula. This was the formula for the first cell in which the value of x at that instant was 0. To obtain subsequent values, the cells were auto-filled to give the values for the graph. Line f1(x) represents the function f1(x) given. Line f2(x) represents the function f2(x) given. Line f3(x) represents the function f3(x) given. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Protecting against Serious Threats against Computer Systems and Assignment, n.d.)
Protecting against Serious Threats against Computer Systems and Assignment. https://studentshare.org/information-technology/2043657-it
(Protecting Against Serious Threats Against Computer Systems and Assignment)
Protecting Against Serious Threats Against Computer Systems and Assignment. https://studentshare.org/information-technology/2043657-it.
“Protecting Against Serious Threats Against Computer Systems and Assignment”. https://studentshare.org/information-technology/2043657-it.
  • Cited: 0 times

CHECK THESE SAMPLES OF Protecting against Serious Threats against Computer Systems and Networks

Hacking: A Modern Dilemma That Calls for Modern Solutions

Movies and television shows would feature hackers as those young adults who spend all their days and weeks in front of the computer.... This was the time when personal computers and computer networking came into fore as technologies enjoyed by mankind.... As computer users grow in number, a new breed of threat of 'computer invaders' also came.... Hackers, or the 'computerphiles' as some would call them, are people who have very good knowledge of computer technology....
9 Pages (2250 words) Essay

Securing Jacket-X Corporations Network against Cyber Threats

Key areas to address so as to avert cyber It is important for Jacket-X to implement ways of detecting and securing networks so as to counter cyber threats vulnerabilities such as email spoofing, denial of service attack, malware intrusion, spywares, hackers as well as data and information theft that are implemented through the network (Roberta Bragg, 2004).... Another vulnerability posed by networks is the fast...
5 Pages (1250 words) Coursework

Modern Day Attacks against Firewalls and VPNs

nbsp;Notably, Virtual Private networks (VPNs) refer to a network, which is created by using a public connection such as the internet.... In a similar context, firewalls are the security system used to secure the flow of information between the two networks.... Firewalls place a bottleneck between the networks which ensures the privacy and confidentiality of the data shared between the two networks.... Firewalls are integrated security systems designed to secure networks from unauthorized access....
8 Pages (2000 words) Essay

The Analysis of the Security Policy

Malwares refer to types of software whose installation into a computer leads to the performance of undesired tasks.... There are many malware… Some of the serious damages and loses that could happen to a computer due to antivirus, spyware, and adware invasion include data loss, sharing In addition, certain malware programs are meant to transfer information regarding website activities to third parties (Vacca, 2013).... If defines the handling of computer gadgets in the organization including how regularly computer software maintenance is expected to be performed, the manner in which computer updates are conducted, the type of programs to be installed and used on computers....
4 Pages (1000 words) Assignment

Smartphones and the Security of the Data in Them

Personal computers can be hacked or could get viruses and spyware, while networks are the target of security breaches, and of course, smartphones can be attacked as well.... om, a smartphone is “is a device that lets you make telephone calls, but also adds features that you might find on a personal digital assistant or a computer.... rdquo; This means that technically, a smartphone is a miniature personal computer or laptop that can make calls because according to the article, “A smartphone also offers the ability to send and receive e-mail and edit Office documents, for example....
7 Pages (1750 words) Term Paper

A Threat Analysis to Enterprise Computer Networks and How to Mitigate Them

Managers, employees and individuals working for and in organizations should be involved with information systems and the required security because they tend to be less functional without this knowledge.... This research proposal "A Threat Analysis to Enterprise Computer networks and How to Mitigate Them" focuses on Network security that encompasses areas pertaining to risks and threats and how to protect IT infrastructure from different types of malware....
5 Pages (1250 words) Research Proposal

The Major Security Threats

The paper 'The Major Security Threats' presents computer and network security that has turned out to be a serious challenge for governments, organizations, and individuals.... t is an admitted fact that computer and information security is a serious issue in today's world.... In this scenario, some penetration testing can be performed on these applications to determine their strength against security threats.... This report presents a detailed analysis of some of the major security threats by applying penetration testing techniques in order to determine the risks that these security threats pose to users....
8 Pages (2000 words) Term Paper

Information System for Travel and Tourism

hellip; They intentionally break into systems and overstep their bounds.... The essay identifies the common ways used by hackers to gain access to systems and critically evaluates the methods used to defend systems.... Hackers focus on individual computer systems whenever they are online.... The threat level of each of these malicious codes refers to its potential to spread and even infect computer systems.... They also crash on the wireless networks which are not strengthened by installed and enabled firewalls....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us