10625
10625
10625
Network Security
Exercise
A. Multiple choice questions
1. Which of the following is not an external threat to a computer or a computer network
(a) Ignorance (b) Trojan horses (c) Adware (d) Crackers
3. With genetic and genomics research which of the following issues is of specific concern
(a) Anonymity (b) Intellectual property
(c) Software piracy (d) Concerns about biochip implants
6. It is a program or hardware device that filters the information coming through an internet
connection to a network or computer system.
(a) Anti virus (b) Firewall (c) Cookies (d) Cyber safety
7. It allow a visited website to store its own information about a user on the user’s
computer.
(a) Spam (b) Malware (c) Cookies (d) Adware
10. Exploring appropriate and ethical behaviors related to online environments and digital
media.
(a) Cyber ethics (b) Cyber safety (c) Cyber security (d) Cyber law
Site licenses: permit the use of software on any computer at a specified site. Unlimited site
licenses allow the installation of the software on any number of computers as long as those
computers are located at the specified site.
Q4. Define the following terms: (a) Spyware (b) Malware (c) Virus (d) Worms
Ans. (a) Spyware: Spyware is simply software that literally spies on what is being done on a
computer. Spyware can be as simple as a cookie used by a website or a more dangerous type
such as a key logger that records every keystroke one makes on a keyboard.
(b) Malware: software that has a mischievous purpose such as virus attacks, worms, adware,
Trojan horses, and spyware. This is the most prevalent danger to a system.
(c) Virus: A computer virus is a program that replicates itself. A computer virus attaches itself to a
program or file to help it spread from one computer to another. Almost all viruses are attached to
an executable file, which means the virus may exist on a computer but it actually cannot infect the
computer unless one runs or opens the malicious program. A virus will also have some other
unpleasant functions.
(d) Worms: A worm is similar to a virus and is considered to be a sub-class of a virus. It spreads
from computer to computer, as it has the capability to travel without any human action. A worm
takes advantage of file or information transport features on a system, which is what allows it to
travel unaided. Worms cause harm to the infected network.
Q5. Read about ethical hacking and write a short note on your understanding of the topic.
Ans. Ethical hacking refers to the act of locating weaknesses and vulnerabilities of computer and
information systems by duplicating the intent and actions of malicious hackers. Ethical hacking is
also known as penetration testing, intrusion testing, or red teaming. An ethical hacker is a security
professional who applies their hacking skills for defensive purposes on behalf of the owners of
information systems. An ethical hacker operates with the knowledge and permission of the
organization for which they are trying to defend.
Q6. Why Cyber security should be taken care by the user while working on internet?
Ans. Cyber security should be taken care by the user while working on internet due to a number of
problems arising when users are not aware about security external and internal threats on the
internet. These threats include:
Malware: -- explain this in few lines --
Adware: -- explain this in few lines --
Hackers and Crackers: -- explain this in few lines –
Q7. Discuss all the point which should be kept in mind while working on computers.
Ans. Cyber ethics must be practiced at every level of computer use—from the novice user to an
information technology professional whose job requires significant use of online resources. Those
who use the internet must be follow ethical practices in every aspect of its use.
Q8. What is Denial of Service attack? How it affects the systems performance?
Ans. A denial-of-service attack (DoS attack) is a cyber-attack where the perpetrator seeks to make
a machine or network resource unavailable to its intended users by temporarily or indefinitely
disrupting services of a host connected to the Internet. Denial of service is typically accomplished
by flooding the targeted machine or resource with superfluous requests in an attempt to overload
systems and prevent some or all legitimate requests from being fulfilled.
Some copyrighted software is made available for use, free of charge for an unlimited time.
These are called freeware. The copyright still remains with the producer / owner for any future
development.
Q11. What do you mean by open source software's? How are they different from proprietary
software's?
Ans. Open-source software (OSS) is computer software with its source code made available. It is
very often developed in a public, collaborative manner. A license for open sources software allows
the end user to study, change and distribute the software for any purpose. While in proprietary
license the copyright stays with the producer and it does not allow in modification or further
distribution of the software. Proprietary software's source code is never made public.
Q12. In groups of 4-5 discuss how software cookies can be ‘helpful’ to both the user of the
computer and the websites that created them. Document your understanding. It could
be a poster, a brochure, a poem or a skit.
Ans. --- Home Work / Class Work --
Q13. What all do you usually do while you are connected to the net? Make a list and then
plan all the security measures that you could take to safeguard yourself. Share this list
with at least two of your peers and compare it to their lists.
Ans. --- Home Work / Class Work –
Hint:
Activity Safety Measure
Browsing website 1. Not downloading suspicious files with .exe extension
2. Using updated ver. of browser, OS and Antivirus
3. Using Firewall
Using social media 1. Keeping private information hidden
2. No interaction with unknown people / strangers
3. Not clicking on suspicious links send by strangers