Question

In: Computer Science

answer the questions : Brief answers adding examples in your report, such as iPhone x, Nexus...

answer the questions :

Brief answers

adding examples in your report, such as iPhone x, Nexus 5, etc

_____________________________________

Define the term, digital security risks, and briefly
describe the types of cybercriminals

• Describe various types of Internet and network attacks,
and explain ways to safeguard against these attacks

• Discuss techniques to prevent unauthorized computer
access and use

• Explain the ways that software manufacturers protect
against software piracy

• Discuss how encryption, digital signatures, and digital
certificates work


• Identify safeguards against hardware theft,
vandalism, and failure

• Explain options available for backing up

• Identify risks and safeguards associated with
wireless communications

• Recognize issues related to information accuracy,
intellectual property rights, codes of conduct, and
green computing
• Discuss issues surrounding information privacy

• A digital security risk is any event or action that
could cause a loss of or damage to a computer or
mobile device hardware, software, data,
information, or processing capability

• Any illegal act involving the use of a computer or
related devices generally is referred to as a
computer crime

• A cybercrime is an online or Internet-based illegal
act

Solutions

Expert Solution

Solution 1: Any incident or some kind of act that may actually lead to the compromise of the data or the resources that are present inside any computer system. There can be different kinds of cybercriminals depending upon different kinds of attacks they can instigate on the basis of the domains they are working upon, for example there are hackers and then there are crackers. A hacker is a person who actually keeps on gathering the knowledge regarding the vulenerabilities and several other weaknesses inside a computer system and are ready to share with anyone, on the other hand, a cracker is one that breaks into some a computer system anyway thereby leading to the loss of data and other important resources.

Solution 2: There can be so many ways to control the access and this method of controlling and providing the access to the people on the basis of their roles and responsibilities is known as access control mechanism. The safest method to perform the autherization to the people to their respective computer systems is through the course of multi-factor authentication in which a number of their devices are connected to the computer system and whenever they try to access the computer system, a push notification would be sent to the user on their mobile and the system would only open up if the user would respond to that access request.

Solution 3: The software manufacturers prevent the privacy, they use the licensed agreement and require the product activation as well.

Solution 4: The encryption techniques are used to encode the message into a particular code that cannot be broken down, the digital signature is form of data protection technique to preserve the authenticity of a particular file that is sent to a particular person by another person.

Solution 5: To safeguard the hardware against the vandalism or theft, the organizations need to deploy a lot of security personnel at the facility, and on the other hand, and in order to make sure that a particular software or the hardware does not fail then they need to make sure that the same product is actually manufactured without any defect.

Solution 6: There are so many options for backing up the data and this mainly include storing the data in some hard disk or an external storage device, storing the data on cloud-based servers, etc.

Solution 7: There have been more and more focus given these days over the issues of information accuracy as due to the boom in the field of social networking sites, there is no boundations to the information that is being forwarded and hence the fake information and fake news are becoming an issue within the society. The software professionals have to follow certain codes of conduct while developing a software so that they can maintain the ethics. Green computing refers to the use of the practices and the rules and regulations that lead to less carbon emission and less pollution.

Solution 8: As more and more people are getting connected over the internet, more and more data associated with them is generated over the internet that is vulnerable and can be misused by the hackers or crackers. This is the reason why there have been legislations in certain parts of the world that direct the organizations to ensure the data privacy and the information security to their users at any cost and should ask for the permissions from the users if they are using their data.

Here's the solution to your question and it is absolutely correct, please please please provide it a 100% rating. Thanks for asking and happy learning!!


Related Solutions

Answer these questions : brief answers !!!!!! adding examples in your report, such as iPhone x,...
Answer these questions : brief answers !!!!!! adding examples in your report, such as iPhone x, Nexus 5, etc __________________________________________________________________________________________ • Briefly describe various broadband Internet connections • Describe the purpose of an IP address and its relationship to a domain name • Describe features of browsers and identify the components of a web address • Describe ways to compose effective search text • Explain benefits and risks of using online social networks • Describe uses of various types of...
Answer the following questions and scenarios substantially. Justify your answers by giving specific examples. 1. In...
Answer the following questions and scenarios substantially. Justify your answers by giving specific examples. 1. In a business such as a travel management company, a large amount of information needs to be stored for organization use and future references. Discuss why there is a need to create a database management system for tourism enterprises? 2. You are a manager of a travel agency and you have a bulk of office files with you. What filing technique will you adopt to...
Provide brief answers to the following questions. Use specific situations and examples where applicable ( In...
Provide brief answers to the following questions. Use specific situations and examples where applicable ( In Your Own Words) State and explain any two (2) sampling techniques / method in auditing  
There are 3 short answer questions in this paper. Type your answers where indicated. Your answers...
There are 3 short answer questions in this paper. Type your answers where indicated. Your answers can be in bullet point form. A local resort in the Blue Mountains is for sale. What are the potential valuation effects of COVID-19 and of the bad bushfire season the year before? Identify how these events would be taken into consideration in a valuation model. Be sure to identify positive or negative valuation effects and whether these effects are short term or long...
Please answer the short answer questions below. Be brief and concise. Your grade will be determined...
Please answer the short answer questions below. Be brief and concise. Your grade will be determined as much by the clarity of your answer as its validity. (a) [10 points] Are you more likely to observe a student discount at a skateboard store or a coffee shop? Explain your answer. (b) [10 points] Explain why if you were a maple syrup producer belonging to the maple syrup cartel that you would have an incentive to sell more and not less...
Answer the following questions. Your answers should address all parts of the questions and be approximately...
Answer the following questions. Your answers should address all parts of the questions and be approximately 300-400 words each. Make sure to thoroughly support all answers with accurate details and relevant evidence from the textbook and other resources. 1. Several coworkers are in the lunchroom on their lunch break. Sam and his friend George are having a rather loud conversation about the party they attended over the past weekend. George relates a joke that he heard at the party; it...
For short-answer questions, provide your answers and explanations. For numerical questions, it is important to show...
For short-answer questions, provide your answers and explanations. For numerical questions, it is important to show your work. In March 2020, Snow Fun, Inc., made a rights issue at a subscription price of $10 a share. One new share can be purchased for every 3 shares held. Before the issue, there were 12 million shares outstanding, and the share price was $15. (1) What is the total amount of new money raised? (2) What is the expected stock price after...
For short-answer questions, provide your answers and explanations. For numerical questions, it is important to show...
For short-answer questions, provide your answers and explanations. For numerical questions, it is important to show your work. Canada Telecom, a telephone company, is contemplating investing in a project in multimedia applications. The company is currently 30% debt financed. The company’s analysts have estimated the project’s cash flows but need to determine the project cost of capital. Canada Telecom analysts assess that their new multimedia division has a target debt-equity ratio of 0.6, and a cost of debt of 6.5%....
Answer the following questions based on the reaction below. Report all answers to three significant figures....
Answer the following questions based on the reaction below. Report all answers to three significant figures. K2SO4(aq) + Sr(NO3)2(aq) → SrSO4(s) + 2KNO3(aq) The concentration of K2SO4 is 0.222 M at the start of the reaction, and 0.135 M after 122 seconds. The initial concentrations of the products are zero. 1. What is the average rate of reaction (in M/min) over this time period? 2. What is the average rate of change (in M/min) of K2SO4 in the first 122...
Answer 2 of the following questions and relate your answers with other students’ answers when appropriate:...
Answer 2 of the following questions and relate your answers with other students’ answers when appropriate: 1. In California, farmers pay a lower price for water than do city residents. What is this method of allocation of water resources? Is this allocation of water efficient? Is this use of scarce water fair? Why or why not? 2. If farmers were charged the same price as city residents pay, how would the price of agricultural produce, the quantity of produce grown,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT