Computer security refers to techniques for ensuring data stored on a computer cannot be read or compromised without authorization. This usually involves encryption and passwords. Big data refers to extremely large datasets that can be analyzed computationally to reveal patterns. The Internet of Things connects interrelated computing devices and objects through unique identifiers that allow data transfer without human interaction. Active attacks modify intercepted information while passive attacks only intercept without changing data. Signs of an attack include antivirus detecting viruses, firewalls blocking unauthorized access, and proxies routing internet traffic. HTTPS and IPv6 are secure internet protocols, and their use can be determined by checking browser settings and connections.
Download as PPTX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
39 views
Computer Security: Eduardo Mamblona
Computer security refers to techniques for ensuring data stored on a computer cannot be read or compromised without authorization. This usually involves encryption and passwords. Big data refers to extremely large datasets that can be analyzed computationally to reveal patterns. The Internet of Things connects interrelated computing devices and objects through unique identifiers that allow data transfer without human interaction. Active attacks modify intercepted information while passive attacks only intercept without changing data. Signs of an attack include antivirus detecting viruses, firewalls blocking unauthorized access, and proxies routing internet traffic. HTTPS and IPv6 are secure internet protocols, and their use can be determined by checking browser settings and connections.
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7
Computer security
Eduardo Mamblona Define the following concepts:
• computer security: In the computer industry, the term security -- or
the phrase computer security -- refers to techniques for ensuring that data stored in a computer cannot be read or compromised by any individuals without authorization. Most computer security measures involve data encryption and passwords • big data: extremely large data sets that may be analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions • Internet of things: The internet of things, or IoT, is a system of interrelated computing devices, mechanical and digital machines, objects, animals or people that are provided with unique identifiers (UIDs) and the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. Explain the difference between active security and passive security on the computer and make a simile with a car.
• The active attack includes modification of
the message. On the other hand, in passive attacks, the attacker doesn't commit any changes to the intercepted information. ... In contrast, an active attack is a threat to the integrity and availability of the data. What are the symptoms that our team is under attack? Just if its works wrong or don’t work • a) Antivirus It detects the presence of a computer virus on a floppy disk or a computer and removes it. • b) Firewall or firewall In computing, a firewall is the part of a computer system or a computer network that is designed to block unauthorized access, while allowing authorized communications. • c) Proxy A proxy is an intermediate computer that is used in the communication of two others. The information (usually on the Internet) goes directly between one computer and another. Explain the following two protocols on the Internet HTTPS and IPv6 and indicate how to know if you are using or your computer has them. • The secure Hypertext Transfer Protocol is an application protocol based on the HTTP protocol, intended for the secure transfer of Hypertext data, that is, it is the secure version of HTTP. • IPv6 is version 6 of the Internet Protocol, is responsible for directing and routing the packets on the network, it was designed in the 70s with the aim of interconnecting networks. Explain • Virus Computer program made in anonymity that has the ability to reproduce and transmit independently of the will of the operator and that causes more or less serious alterations in the operation of the computer. • Worm A worm virus is a malicious, self-replicating program that can spread throughout a network without human assistance. • Keylogger A keylogger is software or hardware that can intercept and save the keystrokes made on the keyboard of a computer that has been infected. • SPYWARE software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive. • Adware software that automatically displays or downloads advertising material such as banners or pop-ups when a user is online. • Cookies A small text file (up to 4KB) created by a website that is stored in the user's computer either temporarily for that session only or permanently on the hard disk (persistent cookie). Cookies provide a way for the website to recognize you and keep track of your preferences • Explain the difference between commercial software, proprietary software, free software and freeware • Freeware: Freeware is computer software that is made available free of charge, but which is copyrighted by its developer, who retains the rights to control its distribution, modify it and sell it in the future. It is typically distributed without its source code, thus preventing modification by its users.
New Perspectives on Computer Concepts 2011 Comprehensive 13th Edition June Jamrich Parsons - The full ebook version is available, download now to explore