Question

In: Computer Science

Give at least 3 things that are digital security risks. What is a virus, a worm,...

  1. Give at least 3 things that are digital security risks.
  2. What is a virus, a worm, and a trojan horse? Give an example of each one.
  3. What is https? How do you use it?

Solutions

Expert Solution

Three things that are digital security risks

There are various things that are digital security risks

Three things among them are

*Low or poor information security practises by the vendors are one of the thing that leads to digital security risk as they maintain low security practises

*Software security vulnerabilities in the companies is digital security risk

* Unawareness or lack of awareness of cyber security or digital security among the workers in the organisation

*Device with no genuine hardware or software tha contains software or hardware

Virus

In computer virus is a malicious code or program that is loaded into user computer without his/her knowledge to perform malicious activities

Examples are: code Red,nimda ,blaster ,creeper and etc.

Worm

Worm is the malware or malicious software program in the computer that replicates itself without any human interaction,it spreads copies of itself from one system to other.

Example: Michelangelo ,Msblastworms

trojan horse

Trojan horse is also a malicious codeor software that takes control over the system/computer

Trojan misleads the users correct intent

It focuses on damaging , stealing, disrupting the system

Example:emotet banking trojan, backdoor trojan, downloader trojan.

Https

https which is known as Hypertext Transfer protocol secure which is the advanced version of http that is hyper text transfer protocol with add-on secure socket layer

*Here encryption is done so that it is accessible to authorised persons

Https is used to transfer the data between web server and web browser securely or in secured way.

For setting up https or to use it we have follow the following steps

*First we should have Host with the ip address

*next we need to buy a certificate

*We need to activate certificate

*Then install the certificate

*And then we need to update the site to use https


Related Solutions

Question 1: What is a virus? What is a worm? How are they different? Outline measures...
Question 1: What is a virus? What is a worm? How are they different? Outline measures you should take to protect yourself against viruses and worms.
Q10. Describe the concept of the digital signature? What are the security properties that can be...
Q10. Describe the concept of the digital signature? What are the security properties that can be gained when using digital signature? Q11. Describe the concept of the message authentication code. Why it cannot be used to provide the property non-repudiation. Q12. In RSA algorithm, what is the relationship between the private key d and the value e from the public key? Explain the condition that must be held when finding the value e. Q13. Why authentication based on symmetric keys...
Workstation security can be an issue in many organizations. What are some of the things a...
Workstation security can be an issue in many organizations. What are some of the things a health care organization can do to secure a workstation to ensure no PHI is viewed by someone who is not authorized to view it?
Give at least three things that makes a bad speech and/or speaker.  Explain why you think...
Give at least three things that makes a bad speech and/or speaker.  Explain why you think each of these things makes for a poor speech/speaker
What are the security risks involved in allowing cookies to be stored on your computer?
What are the security risks involved in allowing cookies to be stored on your computer?
3) Analyze security, privacy, ethical, and legal issues related to the digital information world and marketing
3) Analyze security, privacy, ethical, and legal issues related to the digital information world and marketing
What are the challenges of digital economy?? Give 5 challenges with explaination
What are the challenges of digital economy?? Give 5 challenges with explaination
Define the phrase “white privilege.” Give at least 3 examples
Define the phrase “white privilege.” Give at least 3 examples
Describe Thucydides’ approach to doing history. In your analysis, cite at least 3 specific things the...
Describe Thucydides’ approach to doing history. In your analysis, cite at least 3 specific things the historian himself mentions.
What e-commerce security requirements the work principle of digital signature can provide?
What e-commerce security requirements the work principle of digital signature can provide?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT