Sunday, May 24, 2020
Note: This images of Github HomePage is only for Learning Purpose and not intention to steal or illegal purpose. Only for study purpose. ...
0 Comments
Friday, May 22, 2020
ELearning College Assignment 1 (Solution) 1. What is cyber security? Answer : First of all, the term cyber security refers to...
CYBER SECURITY
Friday, May 22, 2020
1 Comments
Friday, May 22, 2020 1 Comments
ELearning
College Assignment 1 (Solution)
1. What is cyber security?
Answer:
First of all, the term
cyber security refers to all the safeguards and measures to reduce the digital
security breach. Cyber security affects all the computers and mobile phone or
any other devices concerned with internet across the world may be targeted by
cyber criminals. Cyber security means to protect from intruder, hackers, and
illegal crimes. It mainly focus on security of confidential data and
information around the world. Security breach is not a new thing for us because
we man have heard or seen such activities in this digital era. Cyber security
helps us to protect from such breaching, hacking, malwares and many more. Today
world the most demanding technology is cyber security.
2. What are the main objective of cyber security?
Answer:
The main objectives of
cyber security are as follows:
Confidentiality:
It means that only the sender and receiver can see the message or information
or access it. It gives fully privacy with two person only.
But when third person
access this message then it is no more remains confidential.
Authentication:
It means authenticating user’s identity. It take user’s real identity which
concern that same person is sending message.
Integrity;
It means there is not any change in message or modification in message. Any
change in message leads to dishonesty in message like alter, delete, insert,
etc then its integrity is lost.
Non-repudiation: It is a situation like when a user send a
message but later says that I have not send this message. So non-repudiation
does not allow the sender to refuse after sending the message.
Access control:
It ensures which user can access and which cannot access.
Availability:
It says that the resources that is available will be available to the
authorized user only but not the rest.
3. What is rogue software ?
Answer:
Rogue software refers to
the fake antivirus that pretends you’re infected with virus. It may asks you
about money or to but things or to enter your debit card number. All this is a
fake security alert or scam to access your confidential data or files. It is a
form of malicious software and internet fraud that misleads user into believing
there is a virus on their computer and aims to convince them to pay fake
malware remove tools that actually install as many as malware on your computer.
For example:
Torjan horse which leads you to believe that your computer has virus so either
follow fake or install anti–virus to protect computer.
4. What are the internal and external attacks of cyber security? And what are the preventive measure to protect cyber crime ?
Answer:
The difference between
internal and external attacks are:
Cyber criminals may be
the organization or entity or may be stranger. We cannot predict without proof.
But there are two distinct categories of cyber-attacks carried out by criminal’s
entities worldwide.
Internal Attack:
an internal attack occurs when an individual engages in some kind of malicious
activities, by ways of their authorized access to the system. In the majority
of internal attacks which are carried out by disgruntled employees,
dissatisfied contractors, former employees who still have access to the
organization’s system and so on. Internal attacker may have high level of
access privileges, however easy to track back to their origins. Such attacks
damage less comparison to external attack.
Examples:
Data thief is on risk, passwords no longer cut it, the threat within, companies
lack security skill etc.
External Attack:
an external attacks occur when anyone who does not have authorized access to
the company’s systems launches an attack. Any business that operates computers
and IT systems that are connected to the internet is technically a viable
target for external attackers worldwide. Most attacks by firewalls and
safeguards. They uses malware, phishing, DOS attacks, ransomware to access from
externally to gain access to control your system or software.
Examples:
DDoS, web app s are under attack, ransomware, phishing etc.
These are the preventive
measure you can take to protect from cybercrime:
i) Keep tracking employee
access levels and change then accordingly and frequently.
ii) Change passwords and
other information when after an employee leaves.
iii) While training don’t
share confidential data or information or passwords and ensure that passwords
meet at least medium level of requirements.
1 Comments
Thursday, May 21, 2020
According to the Pirple.com site in html lists, I have learned about the ordering list and un-ordering list of the receipe to make pudding ...
Recipe of Pudding Rice
Thursday, May 21, 2020
0 Comments
Thursday, May 21, 2020 0 Comments
According to the Pirple.com site in html lists, I have learned about the ordering list and un-ordering list of the receipe to make pudding rice which is my favorite dish. I am learning great from this site about html code and want to express my coding work with you guys!
My favorite food is pudding rice.
- Milk
- Water
- Rice
- Sugar
- Cinnamon
- Butter
- Vanilla
- Add 2 cups cooked rice to a medium sized saucepan.
- Add in milk, sugar, cinnamon, butter, and vanilla and bring to a low boil over medium heat.
- Continue stirring for about 15-20 minutes until mixture starts to thicken.
- Serve warm or cold with a sprinkle of cinnamon if desired.
0 Comments
Subscribe to:
Posts (Atom)
Popular Posts
Recent Posts
Popular Posts
-
Security Affairs has published nine methods by which cyber attacks exploit public Wi-Fi wireless networks LANs (free Wi-Fi) . Following are ...
-
Cyber Security (CS): Cyber Security is becoming increasingly complex day by day. Many organizations offer resources and information ...
-
As we all know, working and living anywhere is essential and important for a better life. We all have dreamed of quality of life, good healt...
Recent Posts
Translate
Categories
Powered by Blogger.
Comments
Recent
Search This Blog
Blog Archive
- September 2024 (2)
- February 2024 (2)
- January 2024 (2)
- November 2023 (1)
- July 2020 (1)
- May 2020 (3)
- April 2020 (1)
- November 2018 (1)
- July 2018 (2)
- December 2017 (2)
Recent in Sports
3/recentposts
[recent]
About Me
- Umesh Mandal
- I have a dream of going Japan for work at least 5 years. Also I want to marry someone who understand me and specially cares my feeling.
Categories
Tags
Travel the world
Comments
4/recentcomments
Author Description
Hey there, We are Blossom Themes! We are trying to provide you the new way to look and use the blogger templates. Our designers are working hard and pushing the boundaries of possibilities to widen the horizon of the regular templates and provide high quality blogger templates to all hardworking bloggers!
Random Posts
3/randomposts
Recent
4/recentposts
Popular
-
Security Affairs has published nine methods by which cyber attacks exploit public Wi-Fi wireless networks LANs (free Wi-Fi) . Following are ...
-
Cyber Security (CS): Cyber Security is becoming increasingly complex day by day. Many organizations offer resources and information ...
-
As we all know, working and living anywhere is essential and important for a better life. We all have dreamed of quality of life, good healt...
-
Introduction In this step by step tutorial, I'm going to perform Login and CRUD operations in ASP.NET Web API using Angular 9 Web applic...
-
● Unofficial Study Notes of 20 Modules That Help You Master the Foundations of Ethical Hacking and Prepare to Take the C|EH Certification Ex...
0 Comments: