In: Computer Science
answer the questions :
Brief answers
adding examples in your report, such as iPhone x, Nexus 5, etc
_____________________________________
Define the term, digital security risks, and briefly
describe the types of cybercriminals
• Describe various types of Internet and network attacks,
and explain ways to safeguard against these attacks
• Discuss techniques to prevent unauthorized computer
access and use
• Explain the ways that software manufacturers protect
against software piracy
• Discuss how encryption, digital signatures, and digital
certificates work
• Identify safeguards against hardware theft,
vandalism, and failure
• Explain options available for backing up
• Identify risks and safeguards associated with
wireless communications
• Recognize issues related to information accuracy,
intellectual property rights, codes of conduct, and
green computing
• Discuss issues surrounding information privacy
• A digital security risk is any event or action that
could cause a loss of or damage to a computer or
mobile device hardware, software, data,
information, or processing capability
• Any illegal act involving the use of a computer or
related devices generally is referred to as a
computer crime
• A cybercrime is an online or Internet-based illegal
act
Solution 1: Any incident or some kind of act that may actually lead to the compromise of the data or the resources that are present inside any computer system. There can be different kinds of cybercriminals depending upon different kinds of attacks they can instigate on the basis of the domains they are working upon, for example there are hackers and then there are crackers. A hacker is a person who actually keeps on gathering the knowledge regarding the vulenerabilities and several other weaknesses inside a computer system and are ready to share with anyone, on the other hand, a cracker is one that breaks into some a computer system anyway thereby leading to the loss of data and other important resources.
Solution 2: There can be so many ways to control the access and this method of controlling and providing the access to the people on the basis of their roles and responsibilities is known as access control mechanism. The safest method to perform the autherization to the people to their respective computer systems is through the course of multi-factor authentication in which a number of their devices are connected to the computer system and whenever they try to access the computer system, a push notification would be sent to the user on their mobile and the system would only open up if the user would respond to that access request.
Solution 3: The software manufacturers prevent the privacy, they use the licensed agreement and require the product activation as well.
Solution 4: The encryption techniques are used to encode the message into a particular code that cannot be broken down, the digital signature is form of data protection technique to preserve the authenticity of a particular file that is sent to a particular person by another person.
Solution 5: To safeguard the hardware against the vandalism or theft, the organizations need to deploy a lot of security personnel at the facility, and on the other hand, and in order to make sure that a particular software or the hardware does not fail then they need to make sure that the same product is actually manufactured without any defect.
Solution 6: There are so many options for backing up the data and this mainly include storing the data in some hard disk or an external storage device, storing the data on cloud-based servers, etc.
Solution 7: There have been more and more focus given these days over the issues of information accuracy as due to the boom in the field of social networking sites, there is no boundations to the information that is being forwarded and hence the fake information and fake news are becoming an issue within the society. The software professionals have to follow certain codes of conduct while developing a software so that they can maintain the ethics. Green computing refers to the use of the practices and the rules and regulations that lead to less carbon emission and less pollution.
Solution 8: As more and more people are getting connected over the internet, more and more data associated with them is generated over the internet that is vulnerable and can be misused by the hackers or crackers. This is the reason why there have been legislations in certain parts of the world that direct the organizations to ensure the data privacy and the information security to their users at any cost and should ask for the permissions from the users if they are using their data.
Here's the solution to your question and it is absolutely correct, please please please provide it a 100% rating. Thanks for asking and happy learning!!