Computer_Systems_Assignment
Computer_Systems_Assignment
OF
AGRICULTURE AND TECHNOLOGY
TITLE: ASSIGNMENT 1
DATE:21/03/025
NAME:ROSEMARY WANJIKU
REG No:HDE217-2640/024
Table of Contents
Introduction .............................................................................................................................................. 1
Microcomputers .................................................................................................................................. 1
MINI COMPUTER ................................................................................................................................ 3
Mainframe ............................................................................................................................................. 4
Characteristics: ............................................................................................................................... 5
Supercomputer .................................................................................................................................... 5
Quantum computer super computer .......................................................................................... 6
2. HISTORICAL BACKGROUND OF COMPUTER: ......................................................................... 7
Early Computing Devices ............................................................................................................ 7
19th-Century Developments ..................................................................................................... 8
20th-Century Breakthroughs .................................................................................................... 8
Generations of Computers .......................................................................................................... 8
First Generation of Computer (1937 – 1946): Vacuum Tubes ......................................... 9
Second Generation of Computer (1947 – 1962) – Transistors......................................... 9
Third Generation of Computer (1963 – 1975) – Integrated Circuits .......................... 10
Characteristics: ............................................................................................................................ 10
Fourth Generation of Computer (PC 1975 – Present) – Microprocessors ................ 11
Characteristics: ............................................................................................................................ 11
Fifth Generation of Computers (Present and Beyond) ..................................................... 12
Characteristics: ............................................................................................................................ 12
3. NETWORK THREATS, ATTACKS AND SECURITY MEASURES: ................................. 13
I. INTRODUCTION ....................................................................................................................... 13
II. SECURITY .................................................................................................................................. 13
III. INFORMATION SYSTEMS .................................................................................................. 13
IV. NETWORK SECURITY ......................................................................................................... 14
V. CRYPTOGRAPHY ..................................................................................................................... 14
VI. ENCRYPTION .......................................................................................................................... 14
VII. TYPES OF THREATS ........................................................................................................... 15
VIII. TYPES OF ATTACKS .......................................................................................................... 17
IX. SECURITY MEASURES ......................................................................................................... 22
REFERENCES ..................................................................................................................................... 23
CATEGORIZATION OF COMPUTER SYSTEMS
Introduction
Categories Of Computer System
Microcomputers
Definition: They are commonly called as “Personal Computer” [PC]. They are the
smallest and the cheapest as compared with minicomputers, mainframe, and super
computers.
Despite this they are widely used among people or end-user client, due to their low in
cost they are so small that they can be kept on a table (PC) or even carry out in a bag
(Laptop) or even in a Palm (Mobile Devices).
Their users are fastest growing users compared to other different types of computers.
They are designed primarily for single operation but still they can be used as
a “workstation” in computer networking.
They are commonly called as “Personal Computer” [PC]. They are the smallest and the
cheapest as compared with minicomputers, mainframe, and super computers.
Despite this they are widely used among people or end-user client, due to their low in
cost they are so small that they can be kept on a table (PC) or even carry out in a bag
(Laptop) or even in a Palm (Mobile Devices).
Their users are fastest growing users compared to other different types of computers.
They are designed primarily for single operation but still they can be used as
a “workstation” in computer networking.
1
Examples of Micro-Computers:
These are the single user computer which can be fit on a table. They are small in size
usually with single or only 1 “microprocessor” (CPU) they are designed for a single
location, desktop computer s can be used for entertainment, graphics, and user can
perform high level language. with a single user operating system but it can also be used a
host in computer networking.
Laptop
They can perform with AC or with Battery, these computers are usually used by the
persons who have to work from one location to other not as PC which sticks to one place
as they need AC power to operate. There are wide range of people who use these types of
computers daily may be engineer who has to give a presentation, student who needs to
demonstrate his project, a lawyer, a businessman, a teacher, a graphic designer, a
salesperson etc. The biggest acid of laptops is their mobility.
Palmtop
Palmtop: Palmtops are very small in size devices Which includes input
and output function. Users can attach mouse or keyboard They can perform each and
every task or operation as Personal Computer or Laptop. They have a graphical screen
where a client can do all the functions, for example, sending emails, office works, and
communication inside in a little package. These are the Different computer types which
are utilized or used as a part of gigantic numbers around the world.
Tablet
Tablet PC: Tablet computers are additionally called as notebook. Which enables clients
2
to communicate utilizing computerized pen or a fingertip without utilizing a mouse or
keyboard. They can't satisfy the functionality of Personal Computer or Laptops.
MINI COMPUTER
They are called as "Midrange Computers" and were produced in 1960's using transistor,
center memory technology and innovation. They are quite smaller in size, less expensive
and speedier yet not as quick as a mainframe or supercomputer, they are utilized or used
as a part of private company organizations, and in the production, department to monitor
or screen manufacturing process.
They help multi-client Operations and have a very difficult operating system to deal with
and can function as a "HOST" in a system where 100 terminals can be supported. The
effective and powerful minicomputer is called as "Super-Minis".
Example
VAX
VAX is a discontinued instruction set architecture (ISA) developed by Digital Equipment
Corporation (DEC) in the mid-1970s. The VAX-11/780, introduced on October 25, 1977,
was the first of a range of popular and influential computers implementing that
architecture.
VAX (Virtual Address extension) is an established line of mid-range server computers
from the Digital Equipment Corporation (DEC). It followed DEC's PDP-11 in 1978 and
also introduced a new operating system, VMS. VAX included a 32-bit processor
and virtual memory. Historically, VAX has competed with a number of Hewlett-Packard
and IBM computers in the small enterprise and university-scientific marketplace. In
earlier times, this size and price range of computer was known as the minicomputer.
Today, VAX and its competitors sell "servers" for business networks that use
the client/server computing model.
Advantage
Disadvantage
i. Large
ii. Bulky
Uses of Minicomputer
1.Control of Automated Teller Machine (ATMs)
2.Payroll
3.Hospital patients’ registration
4.Inventory Control for supermarket
5.Insurance claims processing
6.Small bank accounting and customer details tracking
Mainframe
-Large, fast and expensive computer
-Cost millions of dollars
e.g. IBM3091, ICL39, etc.
4
Characteristics:
• Bigger in size than minicomputers
• Very expensive
• Support a few hundred users simultaneously (Multi-Users)
• Difficult to use
• More computing power than minicomputers
• Have to be kept in a special air-conditioned room
• Used in big business organizations and government departments
Supercomputer
Fastest and expensive
Used by applications for molecular chemistry, nuclear research, weather reports, and
advanced physics
Consists of several computers that work in parallel as a single system
5
Quantum computer super computer
• Google, IBM and a handful of startups are racing to create the next generation of
supercomputers. Quantum computers, if they ever get started, will help us solve
problems, like modelling complex chemical processes, that our existing
computers can't even scratch the surface of.
But the quantum future isn't going to come easily, and there's no knowing what
it'll look like when it does arrive. At the moment, companies and researchers are
using a handful of different approaches to try and build the most powerful
computers the world has ever seen. Here's everything you need to know about the
coming quantum revolution.
6
2. HISTORICAL BACKGROUND OF COMPUTER:
The history of computer dated back to the period of scientific revolution (i.e. 1543 –
1678). The calculating machine invented by Blaise Pascal in 1642 and that of Gotfried
Leibnitz marked the genesis of the application of machine in industry.
This progressed up to the period 1760 – 1830 which was the period of the industrial
revolution in Great Britain where the use of machine for production altered the British
society and the Western world. During this period Joseph Jacquard invented the weaving
loom (a machine used in textile industry).
The computer was born not for entertainment or email but out of a need to solve a serious
number-crunching crisis. By 1880, the United State (U.S) population had grown so large
that it took more than seven years to tabulate the U.S. Census results. The government
sought a faster way to get the job done, giving rise to punch-card based computers that
took up entire rooms. Today, we carry more computing power on our smart phones than
was available in these early models. The following brief history of computing is a
timeline of how computers evolved from their humble beginnings to the machines of
today that surf the Internet, play games and stream multimedia in addition to crunching
numbers.
• Abacus (c. 3000 BCE): Used by the Chinese and Babylonians for arithmetic
calculations.
7
19th-Century Developments
• Jacquard Loom (1804): Developed by Joseph Marie Jacquard, this machine used
20th-Century Breakthroughs
• Hollerith Tabulating Machine (1890): Herman Hollerith developed this punch-
card-based machine for processing census data, leading to the foundation of IBM.
Generations of Computers
In 19th century English mathematics professor name Charles Babbage referred as a
“Father of Computer”. He designed the Analytical Engine and it was this design that the
basic framework of the computers of today is based on. Generally speaking, computers
can be classified into five generations. Each generation lasted for a certain period of time
and each gave us either a new and improved computer or an improvement to the existing
computer.
8
First Generation of Computer (1937 – 1946): Vacuum Tubes
In 1937 the first electronic digital computer was built by Dr. John V. Atanasoff and
Clifford Berry. It was called the Atanasoff-Berry Computer (ABC). In 1943 an electronic
computer name the Colossus was built for the military. Other developments continued
until in 1946 the first general– purpose digital computer, the Electronic Numerical
Integrator and Calculator (ENIAC) was built. It is said that this computer weighed 30
tons, and had 18,000 vacuum tubes which was used for processing. When this computer
was turned on for the first time lights dim in sections of Philadelphia. Computers of this
generation could only perform single task, and they had no operating system.
Characteristics:
i. Sizes of these computers were as large as the size of a room.
ii. Possession of Vacuum Tubes to perform calculation.
iii. They used an internally stored instruction called program. iv. Use capacitors to
store binary data and information.
iv. They use punched card for communication of input and output data and
information
Examples:
i. Mark, I developed by Aiken in 1944.
ii. Electronic Numerical Integrator and Calculator (ENIAC) built at the Moore
School for Engineering of the University of Pennsylvania in 1946 by J. Presper
Eckert and William Mauchley. iii. Electronic Discrete Variable Automatic
Computer (EDVAC) also developed in 1947 by Eckert and Mauchley.
9
Characteristics:
i. The computers were still large, but smaller than the first generation of computers.
ii. They use transistor in place of Vacuum Tubes to perform calculation.
iii. They were produced at a reduced cost compared to the first generation of
computers.
iv. Possession of magnetic tapes as for data storage.
v. They were using punch cards as input and output of data and information. The use
of keyboard as an input device was also introduced.
Example:
i. Leprechaun, IBM built by Bell Laboratories in 1947
ii. Transits produced by Philco, GE and RCA.
iii. UNIVAC 1107, UNIVAC III.
iv. RCA 501.
v. IBM 7030 stretch.
Characteristics:
They used large-scale integrated circuits, which were used for both data processing and
storage.
Computers were miniaturized, that is, they were reduced in size compared to previous
generation.
Keyboard and mouse were used for input while the monitor was used as output device.
10
Examples:
i. Burroughs 6700, Mini computers
ii. Honeywell 200
iii. IBM system 360
iv. UNIVAC 9000 series.
Transistors on one chip were capable performing all the functions of a computer’s central
processing unit.
Characteristics:
i. Possession of microprocessor which performs all the task of a computer system
use today.
ii. The size of computers and cost was reduced.
iii. Increase in speed of computers.
iv. Very large scale (VLS) integrated circuits were used.
v. They have millions of circuits per cubic foot.
Examples:
i. IBM system 3090, IBM RISC6000, IBM RT.
iv. HP 9000.
v. Apple Computers.
11
Fifth Generation of Computers (Present and Beyond)
Fifth generations computing devices, based on artificial intelligence (AI) are still in
development, although there are some applications such as voice recognition, facial face
detector and thumb print that are used today.
Characteristics:
i. Consist of extremely large-scale integration.
vi. Satellite links, virtual reality. vii. They have billions of circuits per cubic.
Examples:
i. Super computers ii. Robots
ii. Facial face detector
12
3. NETWORK THREATS, ATTACKS AND SECURITY MEASURES:
I. INTRODUCTION
Recent advancements in the field of information and technology and competitiveness on
real time data have led to an increase in the transmission of data and information
globally. As a result, the organizations have become more vulnerable to network threats
and attacks and are facing invasions in information security and computer networks as
the sources of bypassing and breaking through security have increased. The sensitive
information being transmitted within the network can easily be accessed by an
unauthorized user for malicious purposes The organizations have been facing
interruption, interception, modification and fabrication of their sensitive data from
unauthorized sources which break into their security codes. As a result, the information
security has become an extremely important aspect in ensuring safe and secured
transmission of data through global networks
II. SECURITY
Security has been described as a secure environment which is free from danger posed by
adversaries who can afflict harm both intentionally or accidently. Data security has
become of the major challenges for business organizations including securing
communication channel, encryption techniques and maintaining the databases. With
recent advances in technology the networks are no longer safe from attackers and any
unprotected system can easily be breached from unauthorized sources with an intention to
steal information for malicious purposes. A successful organization needs to implement
six kinds of layers of securities namely physical, personal, operational, communication,
network and information.
13
IV. NETWORK SECURITY
Network security is a vital component of information technology and can be categorized
into four major areas including secrecy, authentication, nonrepudiation and integrity
control. It is a concept of securing and protecting network and data transmission from
unauthorized users who can use the information for malicious purposes. It focuses on
securing variety of networks including both public and private transactions and
communications among businesses, government institutions and individuals. Network
security has become a major component in the organization structure because the
information-maintained passes through large number of systems and devices such as
computers and routers and becomes very vulnerable to threats and attacks.
V. CRYPTOGRAPHY
Cryptography is the art of coding the information in such a way that it becomes difficult
for an unauthorized person to capture, disclose or transfer it. It is a science of writing
secret code by constructing and managing protocol in order to block the adversaries. It is
a vital component of computer and communication network and an emerging technology
which protects the information from eavesdropping. The process of securing the
information is known as encryption and a secret or disguised way of writing a code is
known as a cipher. The encrypted information can be transferred back to its original form
by an authorized user who has the cryptographic key. Different kinds of ciphers have
been used for encryption namely traditional and modern symmetric key ciphers.
Traditional ciphers include substitution and transposition ciphers and DES (Data
Encryption Standard) and AES (Advanced Encryption Standard) come under the category
of modern symmetric key ciphers.
VI. ENCRYPTION
There are two types of encryptions: symmetric and asymmetric in nature. Symmetric
encryptions use single key for encrypting as well as decrypting the code while
Asymmetric encryptions work with two keys, public and private for encrypting and
decrypting respectively. Below are the top 10 threats which have affected Small and
14
VII. TYPES OF THREATS
Network security is highly threatened by the presence of various threats and attacks that
can lead to disclosure of sensitive and confidential information. The basic difference
between a threat and an attack is that while threat is a presence of a constant danger to the
integrity of information, an attack is an actual act of breaching the security of the network
Insider attacks The insider is a part of the organization Implementing dual control principle
that has full access and authorization of helps more than one person to control
the network system. The insider can be login credentials for organization’s
of malicious or accidental nature and servers.
can be a threat to organization’s
confidentiality and integrity.
Poor Many organizations with lack of funds Automated vulnerability audit scan is a
configuration and experience often install networking method which performs check of the
leading to gear without having skilled personnel to entire network and must be conducted at
handle them. regular basis.
compromise
Reckless use Many attackers leave a key logger to Forbidding turning off defenses through
of hotel access passwords and credential certain anti-virus solutions which are
networks and information from personal devices configured in such a way that they
kiosks connected in an infected hotel network cannot be turned off without proper
authorization.
15
that are not much protected enough
counter such attacks.
Reckless use Similar to key logger in hotel networks, Using encrypting connections which can
of Wi-Fi the attackers put up an unsecured Wi-Fi be connected via Virtual Private
hotspots network to capture secured information Networks and encrypts the
such as username and passwords of communication streams preventing
employees without making them aware eavesdroppers to listen to the data
of any threat to their computer. wirelessly.
Data lost on It is a common problem with most of the Centralized management of mobile
portable device users who accidently leave their storage devices through servers and software
devices such as mobile phones, pen such as RIM’s Blackberry Enterprise
drives or USB stick in hotel rooms, taxis Server help the organization ensure
or trains making it easily available for encrypted transmissions and are capable
attackers to retrieve sensitive of remotely wiping out data of lost
information. devices.
Web server Poorly written customer application on Auditing web app code is a measure
compromise websites have made easier for the which helps the users identify whether
attackers to penetrate thousands of the developed code has been performing
servers with automated SQL injection proper input validation or not.
attacks.
Reckless web Various spams, Trojans and viruses Web content filtering such as
surfing by penetrate into the organization’s WatchGuard’s Web Blocker which
employees network systems when the employees maintains updated URL of blocked
surf websites other than related to their websites
business and end up getting victimized
by pool of malware.
16
Malicious This is a common email attack which Implementation of outbound web proxy
HTML email links the user to a malicious website and which includes setting up of LAN
triggers a drive by download by a single system redirecting all HTTP requests
click. and responses to a web proxy server
which monitors all the web traffic.
Automated Such kind of attacks affect the SMEs 1. Investing in patch management which
who are not able to install Windows maintains the network up to date by
exploit of a
patches within the same month their scanning the systems and identifying
known
release and later on fall prey to attacks missing patches and software updates
vulnerability in the form of malicious patches.
A. Passive attacks
In passive attacks the attacker eavesdrops or monitors the data transmitted to find the
content of data transmitted or to analyses the nature of communication. Such attacks
analyses traffic, monitors unprotected communications, decrypts weakly encrypted data
and captures authentic information such as passwords. Such attacks can lead to disclosure
of sensitive information without the knowledge or consent of the user [10]. These attacks
are hard to detect as there is no loss and alteration of data. Therefore, there are various
Networking attacks that have been damaging companies globally are listed below:
17
B. Active attacks
18
Network Percentage Description
Attacks
Browser 36% In these kinds of attacks the hackers add scripts without altering
website’s appearance which may lead the user to another website
and may cause programs of malicious nature to be downloaded to
the system. The attacker can then control the user’s system
remotely capturing personal information such as credit card and
banking details to perform identity theft.
Brute Force 19% It is a guessing technique of decoding password and pin number
through trial-and-error basis. The attackers use automated
software to guess thousands of combinations of passwords.
Locking account after failed multiple login attempts is one of the
ways to prevent such attacks.
Denial of 16% These kinds of attacks block the user’s access to a particular
service network to prevent them from retrieving information and
services. The attacker creates an overloading traffic through
malicious bot to a targeted IP address and floods network with
more requests than the server can process.
SSL 11% It is a kind of attack in which the attacker interrupts the data
before its encryption and hence gets access to sensitive
information of the system.
19
Backdoor 3% Such attacks bypass the intrusion detection systems and allow the
hackers to access the information remotely. Many strategies may
be adopted in backdoor attacks such as port-binding, connect
back and connect availability.
Others 9% The other attacks constitute to around 9% of the total attacks and
may include all attacks which may be of small in nature but have
significant impact on the security of network systems.
In active attacks, the attacker tries to circumvent or break into protected systems in the
on-going communication networks. Such kind of attacks includes breaking into secured
features, injecting a malicious code and stealing or modifying sensitive information. In
these kinds of attacks the data transmitted can be altered by the attacker or the whole data
stream can be changed. Active attacks can be detected but these are difficult to prevent.
Various error detection and correction techniques are used at various network layers to
acquire a safe data transmission. Active attacks can take place in four ways:
Masquerading, Replay, and Modification of message and Denial of Service.
Various attacks have been listed by in their paper which includes e-mail containing virus,
network virus, web-based virus, attack on the server, service rejection attacks and
network user attacks. They have mentioned that the major problem faced by the IT
infrastructure is the vulnerability of computer networks and such problems arise mainly
due to faulty implementation and design of information system including security
procedures and controls. Another kind of security threat named insider attack which is
being mentioned by is capable of causing irreparable damage to the activities and
reputation of the organization.
There are other kinds of network’s attacks which pose serious threat to the confidentiality
of the organization.
20
A. Phishing attacks
These kinds of attackers pretend to be as trustworthy persons with an intention to capture
sensitive information through fraud email and messages. They often create a fake website
such as SBI bank or PayPal and try to trick the users by getting them click on a link and
later on record their personal information including username and password. Such kind of
attacks take as much as 9 to 10 days to resolve.
D. Hijack
This is a kind of an attack in which the hacker intercepts or takes over session between
the user and another system and finally disconnects the later from the communication.
The user remains under the impression that system is still connected and may send
sensitive and confidential information to the hacker by accident.
21
IX. SECURITY MEASURES
A. Firewalls
A firewall can be defined as a device which may be a computer or router acting between
the internet and the organization network. Firewall lets only those packets to be
transmitted through it into an organization’s internal network which fulfils its perimeters
configured by the firewall administrator to be a safe data packet and filters the other
packets. Firewall acts at network, transport and application layers. Packet –filter firewall
acts at network and transport layer and proxy firewall acts on the application layer.
Firewall checks the traffic according to the specific rules it has been configured for but
there may be chances when the attacker can portray the harmful data to have perimeters
which firewall finds safe to be transmitted through it.
B. Antivirus Systems
These systems are used to detect and eradicate malware from our systems. The antivirus
system should be kept updated with the latest updates so that it would be easy for it to
scan the latest virus signatures. Sometimes an antivirus system is not able to detect the
infected file if it is encrypted or zipped.
22
REFERENCES
i. "Charles Babbage Institute: Who Was Charles Babbage?" . cbi.umn.edu.
Retrieved December 28, 2016.
ii. "Ada Lovelace | Babbage Engine | Computer History Museum" .
www.computerhistory.org. Retrieved December 28, 2016.
iii. "Wilhelm Schickard – Ein Computerpionier" (PDF) (in German).
iv. Keates, Fiona (June 25, 2012). "A Brief History of Computing" . The Repository.
The Royal Society.
v. "Science Museum—Introduction to Babbage" . Archived from the original on
September 8, 2006. Retrieved September 24, 2006.
vi. Anthony Hyman (1982). Charles Babbage, pioneer of the computer.
"In this sense Aiken needed IBM, whose technology included the use of punched
cards, the accumulation of numerical data, and the transfer of numerical data from
one register to another", Bernard Cohen, p.44 (2000).
23