IS3110 Lab Answers

Improved Essays
1. What are the danger to the system?

There numerous dangers that can put your system at danger, for example, infections, spyware, worms, Trojans and PC programmers. Your systems are additionally helpless excessively critical who perpetrate cybercrimes.

2. What dangers are there to PC associated with the system?

In the event that PC has the same system then they all are powerless on the off chance that one PC has infections on the grounds that infections are frequently shared by sharing documents. Additionally, that if a noxious bit of programming discovered its way in, it is remotely conceivable that it could traverse the system.

3. What would I be able to do to ensure my system?

Most framework accompany some kind of security suite
…show more content…
Cybercriminals are people who carry out cybercrimes utilizing the web, a PC and the system to execute violations.

6. What sorts of Hackers are there?

White-cap programmers: hacks to test your framework unprotected against demonstrate a point

Dark cap programmers: hacks your framework to for illicit purposes

Dim cap programmers: hacks for the sake of entertainment and to flaunt yet will offer their administrations

7. How do programmers get to your system?

Programmers have no exact way that they get to your framework. They may utilize an infection or in the event that they have direct access to your framework they will utilize a blaze drive, Denial-of-Service Attacks and the Trojans and Rootkits.

8. What is Identity robbery?

Fraud is a type of taking somebody's character in which somebody puts on a show to be you with a specific end goal to have entry to assets, for example, getting your bank data, Visa numbers, and passwords to get to your own data.

9. How is fraud done?

Fraud is finished by utilizing a PC, experiencing somebody's waste, skimming gadgets, spyware and programmers utilize a savvy project to have admittance to your money related data.

10. What is a PC
…show more content…
What are the signs that my PC has an infection?

A few indications that your PC may have an infection are that program symbols or records may vanish, your landing page may look changed and there might be some new included toolbars. You may encounter irregular messages or pop-ups and information records may not open since they are undermined. Your framework may need to begin take quite a while to boot up and projects can totally quit working.

13. What is a firewall and how do firewalls ensure my PC?

A firewall is programming projects or equipment used to search out programmer's infections and worms that attempt to get to your PC utilizing the web. Firewalls shield your PC against spyware, adware and malware. The firewall ensures your PC system in two noteworthy ways. Initially it pieces access to all sensible ports and it keeps your PC system addresses

Related Documents

  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    As a root user, one has the option of giving full permissions to a malicious software or vulnerability. It can change programs in /bin and add backdoors, mess with files in /etc and make the system unbootable, etc. 3. You can be victim of your own stupidity. Swapping of input/output device in data dictionary would be stopped by your lack of permissions, but if you run as root, you have all accesses. 4.…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    BA501 Overview of Business Intelligence Week 1 Assignment David Nagus Grantham University Professor Jackson May 6, 2015 I Introduction With any business with a database system there are bound to be changes and different metrics used in the decisions of running a business. These days almost all businesses have a computer system or network of computers that are interlinked. One aspect of a business is how they secure their network and who has access to data and who does not. On a almost daily basis businesses are being targeted with threats from outside sources to steal data, cause harm or disrupt the daily workings of a business and affecting people's lives.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Information Management Introduction Over the year, I have completed 5 DT internal assessments. These included AS 1.41, AS 1.43, AS 1.45, AS 1.46, and AS 1.50. In completing these assessments, I have became more familiar with the applications that were used to complete these internal assessments, and has given me a better understanding for file structure. Assessments Completed AS 1.43 - First assignment: Website.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    The hacker can also gain access to the files saved on the hard drive and share them with others in…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Unit 9 P2

    • 1782 Words
    • 8 Pages

    Task 1 – Introducing e-commerce into an organisation E-commerce is the actions of trading electronically through the internet. E-commerce has been implemented into most businesses in the modern day and there are many impacts when doing business over the internet. The benefits of introducing e-commerce into your organisation There are many significant benefits to the business when introducing e-commerce into it. Some entail:  The business can accumulate customer information …

    • 1782 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    Ethical Man Month Essay

    • 637 Words
    • 3 Pages

    Question 1: Using The Mythical Man Month reading found on the course homepage, read the project problems mentioned in the text. List the difficulties and errors that occurred in these failed programming projects. In the Mythical Man reading the difficulties and errors that occurred include;  Time complexity  As input increases, Output decreases  Communication Barriers  High cost…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    This includes shredding all paperwork that contains unnecessary confidential health information, checking the fax number before sending confidential information by fax, using closed door and privacy curtains when discussing health information with a client, and keeping medical records attended to at all times. Confidential health information that you see or hear yourself must be kept to yourself and look only at that medical information you need to do your particular job. If employees come to the healthcare facility for care, their information needs to be as protected as anyone else’s medical records. Security safeguards need to be in place at all times. Some ways to do this include the following: *…

    • 1016 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Many people believe that they will never be a victim of identity fraud but everyone is vulnerable to it. Identity fraud is America’s fastest growing white collar crime. Identity fraud is a term used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. The most common forms of identity theft occur when someone obtains another person's social security number, driver's license number, date of birth, and the like and uses it to open a fraudulent bank, credit card, cellular telephone, or other account, or to obtain false loans. Identity theft started to become a very popular crime in the late 1990s because of the increase of computer use.…

    • 1344 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Identity theft is any unauthorized use of someone else’s personal identity to fraudulently obtain money, goods, or services; to prevent the payment of debt; or to avoid criminal prosecution. In 1998, under the authority of the Identity Theft and Assumption Deterrence Act, identity theft became a federal crime with prescribed prison sentences for using identity theft to commit crimes. In addition, increased penalties apply for those who exceed, misuse, or abuse privileged access to personal identification records because of a position of authority. Identity thieves often use simple techniques to acquire personal information, such as Dumpster diving, plundering trash bags, and stealing mail from mailboxes to obtain paper records with identifying…

    • 467 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ten Online Security Mistakes Seniors Make Seniors, in general, are trusting souls and don’t understand the dangers online. There are so many cyber thieves online searching and lurking, waiting for their next trusting victim to make a mistake. Each day at least 1 million cyber-attacks are executed, and the number is growing. It’s our job to keep our seniors informed and protected from all dangers, including the internet. Here are 10 tips on how to explain to seniors they are vulnerable to cyber thieves.…

    • 929 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Conformity Bias

    • 1015 Words
    • 5 Pages

    How times have changed as technologies, have evolved, so too have the tools that cyber attackers use to hack into businesses to access personal information. Fraud has always existed and has hardly changed, only the disguises it uses. In today’s world people, have been taught to push and strive for more and to continue to push for more. This new way of thinking has quickly developed into something uncontrollable. It has caused a new stream of fraud to emerge for it has created higher levels of greed, new methods to detection, as well as new ways to prevention.…

    • 1015 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Identity Theft Essay

    • 1148 Words
    • 5 Pages

    What is identity theft? Under the Identity Theft and Assumption Deterrence Act (ITADA), identity theft is defined as the knowing transfer, possession, or usage of any name or number that identifies another person, with the intent of committing or aiding or abetting a crime. This kind of crime can generate substantial losses to consumers which include the opportunity costs of time spent disputing fraudulent claims, closing existing accounts, and opening new accounts. Still, these may be only part of the costs incurred by the victim (Barker et al.…

    • 1148 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Identity theft occurs more often than what most individuals are aware of. This crime is very common in the United States. In 1998, identity theft became known as a federal crime in the U.S. Technology plays an important factor of identity theft and other frauds in the world. According to the book, “identity theft is considered to be one of the fastest growing form of fraud” (Brightman). In order to prevent identity theft from occurring, I do believe that individual needs to have the knowledge so that one has a clear understanding of what identity theft is and how to protect themselves.…

    • 688 Words
    • 3 Pages
    Improved Essays