0% found this document useful (0 votes)
39 views

Computer Security: Eduardo Mamblona

Computer security refers to techniques for ensuring data stored on a computer cannot be read or compromised without authorization. This usually involves encryption and passwords. Big data refers to extremely large datasets that can be analyzed computationally to reveal patterns. The Internet of Things connects interrelated computing devices and objects through unique identifiers that allow data transfer without human interaction. Active attacks modify intercepted information while passive attacks only intercept without changing data. Signs of an attack include antivirus detecting viruses, firewalls blocking unauthorized access, and proxies routing internet traffic. HTTPS and IPv6 are secure internet protocols, and their use can be determined by checking browser settings and connections.

Uploaded by

mamblona
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views

Computer Security: Eduardo Mamblona

Computer security refers to techniques for ensuring data stored on a computer cannot be read or compromised without authorization. This usually involves encryption and passwords. Big data refers to extremely large datasets that can be analyzed computationally to reveal patterns. The Internet of Things connects interrelated computing devices and objects through unique identifiers that allow data transfer without human interaction. Active attacks modify intercepted information while passive attacks only intercept without changing data. Signs of an attack include antivirus detecting viruses, firewalls blocking unauthorized access, and proxies routing internet traffic. HTTPS and IPv6 are secure internet protocols, and their use can be determined by checking browser settings and connections.

Uploaded by

mamblona
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Computer security

Eduardo Mamblona
Define the following concepts:

• computer security: In the computer industry, the term security -- or


the phrase computer security -- refers to techniques for ensuring
that data stored in a computer cannot be read or compromised by
any individuals without authorization. Most computer
security measures involve data encryption and passwords
• big data: extremely large data sets that may be analysed
computationally to reveal patterns, trends, and associations,
especially relating to human behaviour and interactions
• Internet of things: The internet of things, or IoT, is a system of
interrelated computing devices, mechanical and digital
machines, objects, animals or people that are provided with unique
identifiers (UIDs) and the ability to transfer data over a network
without requiring human-to-human or human-to-computer
interaction.
Explain the difference between active
security and passive security on the
computer and make a simile with a car.

• The active attack includes modification of


the message. On the other hand,
in passive attacks, the attacker doesn't commit
any changes to the intercepted information. ... In
contrast, an active attack is a threat to the
integrity and availability of the data.
What are the symptoms that our team
is under attack?
Just if its works wrong or don’t work
• a) Antivirus It detects the presence of a computer virus
on a floppy disk or a computer and removes it.
• b) Firewall or firewall In computing, a firewall is the
part of a computer system or a computer network that
is designed to block unauthorized access, while
allowing authorized communications.
• c) Proxy A proxy is an intermediate computer that is
used in the communication of two others. The
information (usually on the Internet) goes directly
between one computer and another.
Explain the following two protocols on
the Internet HTTPS and IPv6 and
indicate how to know if you are using
or your computer has them.
• The secure Hypertext Transfer Protocol is an
application protocol based on the HTTP protocol,
intended for the secure transfer of Hypertext
data, that is, it is the secure version of HTTP.
• IPv6 is version 6 of the Internet Protocol, is
responsible for directing and routing the packets
on the network, it was designed in the 70s with
the aim of interconnecting networks.
Explain
• Virus Computer program made in anonymity that has the ability to reproduce and
transmit independently of the will of the operator and that causes more or less
serious alterations in the operation of the computer.
• Worm A worm virus is a malicious, self-replicating program that can spread
throughout a network without human assistance.
• Keylogger A keylogger is software or hardware that can intercept and save the
keystrokes made on the keyboard of a computer that has been infected.
• SPYWARE software that enables a user to obtain covert information about
another's computer activities by transmitting data covertly from their hard drive.
• Adware software that automatically displays or downloads advertising material
such as banners or pop-ups when a user is online.
• Cookies A small text file (up to 4KB) created by a website that is stored in the user's
computer either temporarily for that session only or permanently on the hard disk
(persistent cookie). Cookies provide a way for the website to recognize you and
keep track of your preferences

Explain the difference between
commercial software, proprietary
software, free software and freeware
• Freeware: Freeware
is computer software that is made
available free of charge, but which is copyrighted
by its developer, who retains the rights to control
its distribution, modify it and sell it in the future.
It is typically distributed without its source code,
thus preventing modification by its users.

You might also like