Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Act#1 Lecture 3BSIT3 Ortiz

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

New Era University

College of Computer Studies


Department of Computer Science

CCC112-18
1CICS_Pet

Phases of Java Programming

Kim Lance E. Ortiz

W 4PM-6PM (Lec)
F 1PM-4PM (Lab)
Schedule

Instructor
Prof. Edilberto L. Simbulan Jr.
1. Explain the differences of the following malwares:

A. Computer Virus:

• Nature: A computer virus is a type of malware that attaches itself to a legitimate program or file
and spreads from one computer to another when the infected file is executed.
• Propagation: It typically requires user intervention to spread, as it relies on the sharing of
infected files or programs.
• Purpose: Viruses often aim to corrupt or modify files, disrupt system operations, and replicate
themselves to spread to other systems.

B. Worms:

• Nature: Worms are standalone malicious programs that can self-replicate and spread across
networks without needing to attach themselves to other files.
• Propagation: They exploit vulnerabilities in network services to propagate automatically,
spreading independently of user actions.
• Purpose: Worms are designed to spread quickly and can cause harm by consuming network
bandwidth, degrading system performance, or delivering payloads that perform malicious
actions.

C. Trojans:

• Nature: Trojans disguise themselves as legitimate or desirable programs to trick users into
installing them. Unlike viruses and worms, Trojans don't replicate on their own.
• Propagation: They often rely on social engineering to convince users to execute or install them,
such as through fake software downloads or email attachments.
• Purpose: Trojans can be used to create backdoors for unauthorized access, steal sensitive
information, or perform other malicious activities without the user's knowledge.

D. Spyware:

• Nature: Spyware is a type of malware designed to secretly collect and transmit user information,
often without the user's consent or knowledge.
• Propagation: It is commonly distributed through malicious websites, email attachments, or
bundled with seemingly harmless software.
• Purpose: Spyware is primarily focused on monitoring and gathering information, such as
keystrokes, browsing habits, login credentials, or personal data. The collected information is
then sent to a remote server for unauthorized use.
2. What do hackers use computer viruses for?

Hackers utilize computer viruses for various malicious purposes, including data theft, espionage,
financial fraud, identity theft, disruption of services, ransom attacks, botnet formation,
sabotage, and extortion. These viruses serve as tools to compromise security, infiltrate systems,
and carry out unauthorized activities, often leading to significant harm to individuals,
organizations, or critical infrastructure. Whether for financial gain, political motives, or personal
vendettas, hackers deploy viruses to exploit vulnerabilities, disrupt operations, and compromise
the integrity and confidentiality of sensitive information. Understanding and implementing
effective cybersecurity measures are essential for safeguarding against these malicious
activities.

3. What should I do if I believe my computer may be infected by a computer virus?

If you suspect your computer has a virus, take immediate steps to address the issue. Disconnect
from the internet to prevent further spread, run a thorough antivirus scan, and follow the
software's recommendations to quarantine or remove detected threats. Update your operating
system and software, change passwords, and monitor for unusual activities. If you have
backups, consider restoring your system to a clean state. Seek professional help if needed and
educate yourself on safe computing practices to prevent future infections. Reconnect to the
internet only after ensuring your computer is virus-free.

4. What to do if you suspect your computer is infected?

If you suspect your computer is infected, it's crucial to take immediate action. First, disconnect
from the internet to prevent the potential spread of the infection. Run a comprehensive
antivirus or anti-malware scan on your system, following the software's instructions to
quarantine or remove identified threats. Keep your operating system and software up-to-date
with the latest patches. Change passwords for sensitive accounts and monitor your computer
for unusual activities. If you have a recent, clean backup of your data, consider restoring your
system to that point. Seek professional assistance if you're unsure about the severity of the
infection or if your efforts prove ineffective. Educate yourself on cybersecurity best practices to
reduce the risk of future infections, and only reconnect to the internet once you are confident
that your computer is secure.

5. How can I protect my computer from viruses, worms and trojan horses?

To safeguard your computer from viruses, worms, and Trojan horses, adopt a few essential
practices. Install reliable antivirus software and keep it updated, regularly update your operating
system and software, and activate a firewall for added protection. Exercise caution with emails,
especially those from unknown senders, and avoid clicking on suspicious links. Secure your
network with strong passwords and encryption, practice safe browsing habits, and create
robust, unique passwords for your accounts. Backup your important data regularly, enable
automatic updates for software, and stay informed about the latest cybersecurity threats. These
simple measures can significantly enhance your computer's security and minimize the risk of
malware infections.

6. What do I do if I find a virus on my computer?

If you discover a virus on your computer, it's crucial to take immediate action to minimize
potential damage and protect your data. First, disconnect your computer from the internet and
any local networks to prevent the virus from spreading. Run a full scan using your antivirus
software and follow its recommendations to quarantine or remove the detected virus. If your
antivirus doesn't fully resolve the issue, consider using additional malware removal tools or
seeking professional help. Update your operating system and software to patch any
vulnerabilities. Change passwords for sensitive accounts, and monitor your computer for any
unusual activities. If you have backups, restore your system to a clean state. Finally, educate
yourself on safe computing practices to avoid future infections.

7. What do you see as the objective of information security within a business or


organization?

The primary objective of information security within a business or organization is to safeguard


the confidentiality, integrity, and availability of information assets. This involves protecting
sensitive data, ensuring that information is accurate and reliable, and guaranteeing that
authorized users have access to the information when needed. Information security aims to
mitigate risks associated with cyber threats, data breaches, unauthorized access, and other
potential vulnerabilities that could harm the organization's operations, reputation, and
compliance with regulations. Ultimately, an effective information security program seeks to
create a secure environment that enables the organization to achieve its goals and fulfill its
responsibilities while minimizing the potential impact of security incidents.

8. How do you define risk, vulnerability, and threat, in the context of network security?

In the realm of network security, risk refers to the potential harm or loss resulting from security
incidents, considering the likelihood and impact of threats exploiting vulnerabilities.
Vulnerabilities represent weaknesses in a system's design or implementation that could be
exploited, while threats encompass potential dangers that may exploit these vulnerabilities.
Effectively managing risk involves identifying and mitigating vulnerabilities to protect against a
diverse range of threats, ensuring the confidentiality, integrity, and availability of the network's
information and resources.
9. What are the possible results of an attack on a computer network?

An attack on a computer network can yield various detrimental outcomes, including data
breaches that compromise sensitive information, financial losses through theft or ransom
payments, disruptions of services leading to downtime and productivity losses, identity theft
with fraudulent activities, damage to an organization's reputation, intellectual property theft,
potential regulatory penalties, operational disruptions, the hostile takeover of systems, and the
erosion of trust in online environments. These consequences underscore the importance of
implementing comprehensive cybersecurity measures to mitigate risks and protect both
individuals and organizations from the impact of network attacks.

10. How informed do you keep yourself on network security-related news, and how often
do youcheck out these stories? Where do you get your security news from?

I stay informed about network security developments by regularly visiting reliable cybersecurity
websites and blogs. My commitment involves dedicating a specific amount of time each week to
thoroughly review reports and stay abreast of the latest advancements and trends in network
security. This proactive approach allows me to maintain a current and comprehensive
understanding of the dynamic landscape in cybersecurity, ensuring that I can adapt to emerging
threats and contribute to the enhancement of security measures.

You might also like