Q. What is internet and intranet? Explain the different types of security issues related to the use of internet. Briefly explain the techniques/ tools used to safeguard IT systems. (3+4+3)marks
answer:
- The Internet is a globally-connected network of computers that enables people to share information and communicate with each other. On the internet, there are multiple users and it is very unsafe. It is a public network and can be accessed by anyone. For example, Using Social media on your phone or researching resources via Google.
- An intranet, on the other hand, is a local or restricted network that enables people to store, organize, and share information within an organization. On an intranet, there are limited users and its very safe. It is a private network and is not accessible to everyone. For example, A company used to communicate internally with its employees and share information.
Malicious Software refers to any malicious program that causes harm to a computer system or network. Malicious Malware Software attacks a computer or network in the form of viruses, worms, trojans, spyware, adware or rootkits. Their mission is often targeted at accomplishing unlawful tasks such as robbing protected data, deleting confidential documents or add software without the user consent. Malicious software comes in many forms, such as viruses, Trojan horses, spyware, and worms.
2. Denial-of-Service Attack
A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor. Services affected may include email, websites, online accounts (e.g., banking), or other services that rely on the affected computer or network.
3. Phishing
Phishing attacks are counterfeit communications that appear to come from a trustworthy source but which can compromise all types of data sources. Attacks can facilitate access to your online accounts and personal data, obtain permissions to modify and compromise connected systems and in some cases hijack entire computer networks until a ransom fee is delivered.
4. Application Vulnerability
Application vulnerabilities are flaws or weaknesses in an application that can lead to exploitation or a security breach. With the enormous global reach of the Internet, web applications are particularly susceptible to attack, and these can come from many different locations across many attack vectors.
Apart from these there are many security issues like man-in-the-middle attack, keyloggers, pharming etc. and many more.
To overcome these security issues and to protect the IT systems we can apply the following tools and techniques. They are:
1. Firewall
In addition to firewalls, Intrusion detection systems feature full-time monitoring tools placed at the most vulnerable points or hot spots of corporate networks to detect and deter intruders continually. The system generates an alarm if it finds a suspicious or anomalous event.
programs can create invisible containers inside a partition that act like a hidden disk within a disk.
thanks for this brief answer
ReplyDeletegreat answer provided
ReplyDelete