a. Cyber Security is the protection of internet systems,
including hardware, software, and data from cyberattacks. the
elements of cybersecurity which is used to protect networks and
systems:
- Application Security - Application Security is
the process of protecting a website and many other online services
against different security threats common targets for web
application attacks are content management systems like WordPress,
database administration tools like PHP, MyAdmin, and different kind
of software as the service applications. the application can be
targeted by coding practices, if the code is poorly written hackers
can exploit application layer loopholes to initial attack suppose
if the code is complex it increases the likelihood of unattended
vulnerabilities and malicious code manipulation secondly ease of
execution most attacks can be easily automated and launched
indiscriminately against thousands or even tens or hundreds of
thousands of targets at the same time and lastly the most popular
reason is big as people get paid in bulk to launch an attack on
applications.
Organization failing to secure their web applications run the risk
of being attacked and this is mostly due to vulnerabilities that
are present in the application and this gives leave it for
attackers to manipulate web applications, let's consider the common
type of attacks:
- SQL Injection - perpetrator uses malicious SQL
code to manipulate a back-end database so that he can get his hands
on sensitive information.
- Cross-site Scripting - this usually occurs
when an attacker injects malicious code directly into an
application this way can get access to accounts activate trojans or
modify page content without users' content.
- Remote File Inclusion - a hacker injects a
file onto a web application server by doing so can easily execute
malicious scripts or code within the application as well as steal
data and manipulate it without knowing about it.
- Cross-site request forgery - it is caused when
a malicious web application makes the user's browser perform an
unwanted action in a site to which is currently logged into most of
the time organizations have certain countermeasures to ensure
safety against these attacks.
- Information Security - Information and data
are exchange by people processes and systems. daily processes are
virtually impossible to carry out without the processing of data
and information, the information security ensures that people deal
with the reliable information and data regarding confidentiality
integrity and availability and is an important prerequisite in the
pursuit of a better and above all more reliable service offering
failure of computer systems database is falling into the wrong
hands or the abuse of confidential information can have serious
consequences for organizations businesses and citizens these
include loss of image compensation claims and even political
consequences an information security management system. the key
concepts of information security such as:
- Confidentiality - Information is accessible
only to those who are authorized to view it.
- Integrity - Information especially while being
communicated, is protected against unauthorized modification
- Availability - Information is invulnerable to
attacks or is recoverable in a secured way that is it is available
only to authorized when it should be.
- Non-Repudiation - Sender to information can
not deny the information has not been sent by him.
- Network Security - The network security
consists of policies and practices adopted to prevent and monitor
unauthorized access misuse modification or denial of a computer
network and network-accessible resources only network security can
protect from Trojan horse viruses, network security involves the
authorization of access to data in the network which is controlled
by the network administrator users choose or are assigned an ID and
password or other authenticating information that allows them to
access to information and programs within their authority network
security coverage transactions and communications among businesses
government agencies and individuals too. networks can be private
such as within the company and others which might be open to public
access and network security is involved in organizations and prizes
and other types of institutions it does as a title explains it
secures the network as well as protecting and overseeing operations
being done and the most common and simple way of a network resource
is by assigning it unique name and a corresponding password.
b. Five key professional ethical values -
- Confidentiality - it is the duty to keep
secret all information deemed desirable to keep secret. deemed by
whom? basically, it is any information that the employer or client
would like to have kept secret to complete effectively against
business rivals. often this is understood to be any data concerning
the company's business or technical processes that are not already
public knowledge. But more appropriately it points to the employer
or a client as the main source of decision as to what information
is to be treated as confidential. the primary justification is to
respect the autonomy of individuals and corporations and to
recognize their legitimate control over some private information
concerning themselves. all the major ethical theories recognize the
importance of the company, additional justification includes
trustworthiness, there are public benefits in recognition of
confidential relationships within professional contexts.
- Loyalty - The feeling to support or duty
towards someone or something. it obligates the members of the
organization to be supporters of its goal and policies.
- Transparency - Transparency implies openness,
communication, and accountability which ultimately help in building
trust and integrity. it refers to the quality of something being
done in an open way without secrets. An organization is said to be
transparent of working in open to public and media scrutiny and
public discussion. generally, it is characterized by visibility or
accessibility of information especially concerning business and
financial activities, so that people can trust that they are fair
and honest. transparency is governance broadly refers to the
availability of information to the general public and clarity about
the functioning of government institutions. it also implies that
taking decisions and implementing them is done in a manner that
follows rules and regulations. it also means that information is
freely available and directly accessible to those who will be
affected by such decisions and their enforcement.
- Trustworthiness - the trust can be more
important than right now we earn and destroy trust every single day
through our actions and through our behaviors with our
relationships with our employees, teams, vendors, consumers,
government officials, and medical officials to give us the
information resources that needs, trust is key and critical in
business and leadership.
- Accountability - it means an obligation or
willingness to accept responsibility or to account for one's
actions. in other words, accountability of the exercise of the
power of discretion vested in some authority to which it is due,
failing which, some kind of punishment may follow. it is a simple
term that is answerable for one's action or behavior. the core
values involved in the question of accountability are democracy,
efficiency, and ethics.
c. if everyone can be made happy, as much as better, but if a
choice is necessary, it is always preferable to favor the many over
the few. happiness or pleasure is that which is of the highest
support importance n life pleasure is that makes our lives
valuable. In every person have a specific goal in their life like
students want to achieve good score in academic, employer want to
achieve good promotion in their job circumstances so if they
achieve on there means that will be them greatest happiness which
will not get from other people getting from them gifts or anything
which is realted to them.