Uploaded by Reynand Dumala-on

Art

advertisement
Q1. How is computer hacking of data and information be presented?
#1: Phishing Scams
Email phishing is one of the oldest, and most successful, web hacking techniques out there. Perpetrators
send out mass emails that appear to be an authentic communication from a bank, subscription service or
online payment site. The email tells the recipients to verify their account information by clicking on a
special link. Once people click the link and supply their login information, the hackers are able to divert
money away from the account. Approximately 0.4 percent of people targeted fall victim to these
attacks. That might not sound like much, but if just 100,000 people receive a scam email, statistics tell us
that 400 of them are going to fall for the scam.
Within your company, it’s important to provide ongoing training and education about these types of
attacks. This is the best method for keeping employees from unintentionally providing information that
could compromise your business network.
Another common phishing scam involves the hacker contacting a target and advising them that they have
been the victim of a scam. The perpetrator offers to help the target and asks them for the very same
confidential information – such as social security numbers and banking details – they are claiming has
been stolen.
Remind team members to be on the lookout for suspicious e-mail attachments, pop-up screens asking for
personal information, and hackers posing as authority figures looking for personal or confidential data.
#2: Buffer Overflow
Buffer overflow techniques are used by more sophisticated hackers who are able to gain access to
customer data via online forms. The hacker navigates to an online form and proceeds to provide
excessive data in a form field.
Simple security techniques are unable to respond when a large volume of data is input into an
unexpected entry point.
The hacker might for example, be filling out a web form that asks for a zip code. The form is programmed
to expect five to nine characters, but a knowledgeable hacker can actually break through the system with
complex lines of code that are designed to either steal data, cause damage, or provide the hacker with an
alternate point of entry.
Modern subscription-based cloud security services employ unified threat management (UTM) technology
that helps identify and stop such attacks to keep proprietary data safe and sound from these types of
attacks.
#3: Password Hacking
The use of overly simple passwords and/or not changing the password that came with your computer,
modem or Wi-Fi router is one of the easiest ways you can prevent this type of hacking. There are
websites that provide default usernames and passwords for various models of routers, so it’s simply a
matter of trial and error for a motivated hacker to discover which router your company is using, and then
type in the default password. Change all default passwords when you acquire new equipment and
software, and train your team to change network passwords on a regular basis.
The most secure passwords are ones that use a combination of letters, numbers and special characters.
And while it may seem inconvenient, passwords should be changed every 30 to 60 days to keep your
business network safe.
While instituting a strict company password policy is a sound business practice, it is not always enough.
However, using a cloud-based data protection system in addition to this type of policy is usually enough
to keep a business safe. A simple subscription-based service can provide you with worry-free cyber
security protection for a remarkably affordable price per month.
#4: Downloading Free Software
Downloading free software is almost never a good idea for business owners.
Whether you are looking for a freeware or shareware version of Microsoft Office or accounting software,
consider that by going the free route you are potentially introducing malware, viruses, or “buggy”
software into your system.
Teams of programmers that may not have your best interests at heart are usually the ones designing and
offering free or cheap software. So unless you know that software is absolutely safe, it’s best to spend the
money for a tested commercial version.
#5: Fault Injection
Also known as “fuzzing,” fault injection is one of the more complicated web hacking techniques where
criminals research ways to infiltrate your source code and then try inputting different code to see if they
can crash the system. An example would be a hacker using a database query that could erase content, or
typing in a Web URL that delivers a worm into your network.
Some companies choose to pay “white-hat” firms to test their systems using different fault injection
techniques. Prototype-based fault injection tests a system either at the hardware level or the software
level by introducing a corruptive element to your network. “Black-hat” techniques, which are what
hackers use, generally revolve only around attacking software.
These types of attempts can be recognized through analysis by the UTM found in some cloud
services. With a single cyber attack costing businesses an average of $300,000, it’s imperative that all
business owners get ahead of these types of threats with precautionary security measures.
While no company is ever 100% safe against cyber-attacks, there are strong defenses that can be put in
place to either stop a threat in its tracks or deter would-be hackers from spending their time trying to
overcome additional layers of security.
How they can be prevented?
Update your OS and other software frequently, if not automatically. This keeps hackers from accessing
your computer through vulnerabilities in outdated programs (which can be exploited by malware). For
extra protection, enable Microsoft product updates so that the Office Suite will be updated at the same
time. Consider retiring particularly susceptible software such as Java or Flash, especially as many sites and
services continue to move away from them.
Download up-to-date security programs, including anti-malware software with multiple technologies for
protecting against spyware, ransomware, and exploits, as well as a firewall, if your OS didn’t come prepackaged with it. (You’ll want to check if your OS has both firewall and antivirus built in and enabled by
default, and whether those programs are compatible with additional cybersecurity software.)
Destroy all traces of your personal info on hardware you plan on selling. Consider using d-ban to erase
your hard drive. For those looking to pillage your recycled devices, this makes information much more
difficult to recover. If the information you’d like to protect is critical enough, removing the platters where
the information is stored then destroying them is the way to go.
Do not use open Wi-Fi on your router; it makes it too easy for threat actors to steal your connection and
download illegal files. Protect your Wi-Fi with an encrypted password, and consider refreshing your
equipment every few years. Some routers have vulnerabilities that are never patched. Newer routers
allow you to provide guests with segregated wireless access. Plus, they make frequent password changes
easier.
Speaking of passwords: password protect all of your devices, including your desktop, laptop, phone,
smartwatch, tablet, camera, lawnmower…you get the idea. The ubiquity of mobile devices makes them
especially vulnerable. Lock your phone and make the timeout fairly short. Use fingerprint lock for
the iPhone and passkey or swipe for Android. “It’s easy to forget that mobile devices are essentially small
computers that just happen to fit in your pocket and can be used as a phone,” says Jean-Philippe Taggart,
Senior Security Researcher at Malwarebytes. “Your mobile device contains a veritable treasure trove of
personal information and, once unlocked, can lead to devastating consequences.”
Sensing a pattern here? Create difficult passwords, and never use the same ones across multiple services.
If that’s as painful as a stake to a vampire’s heart, use a password manager like LastPass or 1Password.
For extra hacker protection, ask about two-step authentication. Several services have only recently
started to offer 2FA, and they require the user to initiate the process. Trust us, the extra friction is worth
it. Two-factor authentication makes taking over an account that much more difficult, and on the flip side,
much easier to reclaim should the worst happen.
Come up with creative answers for your security questions. People can now figure out your mother’s
maiden name or where you graduated from high school with a simple Google search. Consider answering
like a crazy person. If Bank of America asks, “What was the name of your first boyfriend/girlfriend?” reply,
“Your mom.” Just don’t forget that’s how you answered when they ask you again.
Practice smart emailing. Phishing campaigns still exist, but cybercriminals have become much cleverer
than that Nigerian prince who needs your money. Hover over links to see their actual URLs (as opposed to
just seeing words in hyperlink text). Also, check to see if the email is really from the person or company
claiming to have sent it. If you’re not sure, pay attention to awkward sentence construction and
formatting. If something still seems fishy, do a quick search on the Internet for the subject line. Others
may have been scammed and posted about it online.
Some websites will ask you to sign in with a specific service to access features or post a comment. Ensure
the login option isn’t a sneaky phish, and if you’re giving permission to an app to perform a task, ensure
you know how to revoke access once you no longer need it. Old, abandoned connections from service to
service are an easy way to see your main account compromised by spam.
Keep sensitive data off the cloud. “No matter which way you cut it, data stored on the cloud doesn’t
belong to you,” says Taggart. “There are very few cloud storage solutions that offer encryption for ‘data
at rest.’ Use the cloud accordingly. If it’s important, don’t.”
Q2. Why are PEOPLE the weakest link in security? Defend your answer.
The weakest link is the People of an organization. According to a report, 78% of the security professional
think the biggest threat to endpoint security is the negligence among employees for security practices. It
also says that theaverage organization experiences 9.3 insider threats per month.
We’re all human; we commit mistakes. But there are a plethora of people who are trying to take
advantage of single silly mistake which can cost your business tremendous financial loss. Advanced
technology and security practices, no matter how sophisticated, will always be constrained by this human
factor. Organizations worldwide are expected to spend close to $100 billion on cybersecurityin 2018, up
from $86.4 billion in 2017. While most companies see their cybersecurity spending as justified because
they believe shiny new technologies can protect them from anything, they are wrong.
According to BakerHostetler’s 2017 Data Security Incident Response Report, which incorporated data
from 450 breaches, 32 percent of all cybersecurity incidents are initiated by human error, 25 percent of
attacks involve phishing and 23 percent were initiated via ransomware. Finally, 21 percent of
cybersecurity incidents occurred due to lost or stolen devices and internal theft.
“No matter what technology we put in place, no matter how much money we spend on protections for
the organization, we still have people, and people are fallible,” said Theodore Kobus, leader of
BakerHostetler’s Privacy and Data Protection team. “Companies should really ask their workers if they
realize they are walking around with sensitive corporate data,” advised Niklas Savanda, Nokia’s Senior
Vice President of Enterprise Solutions.
But addressing the true weakest link in cybersecurity – employees – poses a significant challenge for
organizations as there is no one-size-fits-all approach to cybersecurity readiness. For example, companies
should teach their employees that modern phishing scams have many different and often highly intricate
forms, none of which mentions the Nigerian prince or a large inheritance.
Q3. What is computer virus? Where did the virus coming from?
In more technical terms, a computer virus is a type of malicious code or program written to alter the way
a computer operates and is designed to spread from one computer to another. A virus operates by
inserting or attaching itself to a legitimate program or document that supports macros in order to
execute its code. In the process, a virus has the potential to cause unexpected or damaging effects, such
as harming the system software by corrupting or destroying data. Viruses don’t occur in cyber space
naturally like biological viruses do, of course. A programmer has to create them. So, we are at fault for
all of the headaches we deal with when trying to prevent or remove viruses infected on our systems. So
why do we do it? Or maybe I should say, “Why do THEY do it.” Here are a few reasons why:
– Identity Theft/Restricted Data Theft
– Bragging Rights
– To Gain Remote Control of Your PC
– To damage organizations or competing business entities
I’ll explain a bit more in detail.
Q4. What is the short name of telefacsimile? Give 3 uses of this gadget?
Fax (short for facsimile), sometimes called telecopying or telefax (the latter short for telefacsimile), is the
telephonic transmission of scanned printed material (both text and images), normally to a telephone
number connected to a printer or other output device.
The original document is scanned with a fax machine (or a telecopier), which processes the contents (text
or images) as a single fixed graphic image, converting it into a bitmap, and then transmitting it through
the telephone system in the form of audio-frequency tones.
Here are the different uses of fax:
Communication
Faxes are used by some companies to communicate with their vendors, suppliers, customers and
contractors. Given that, fax technology is less expensive compared with computer networks, many
companies work with vendors or suppliers who only communicate with fax.
Cost
Home-based business operators and several companies may not have made the large investment in a
computer network. They rely on inexpensive fax machines to send and receive hard copy documents. An
instance is a signature page that often gives confirmation of acceptance.
Prospecting and Marketing
Faxes are used by local and international businesses or office-equipment dealers to send out exciting
deals, promotions. Faxes are used to spread the word. Broadcast faxes are mostly used for offering
discounts or announcing sales to a selected database. Faxes work especially well for selling rapidly
changing offerings like real estate, daily rate changes as well as trade show reminders. Newsletters and
press releases, updates about your products and services can also be sent by fax.
Q5.
Internet is a global system of interconnected computer networks that use the standard Internet protocol
suite (often called TCP/IP, although not all protocols use TCP) to serve billions of users worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and government
networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical
networking technologies. The Internet carries an extensive range of information resources and services,
such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to
support email. Internet has been the most useful technology of the modern times which helps us not only
in our daily lives, but also our personal and professional lives developments. The internet helps us achieve
this in several different ways.
For the students and educational purposes the internet is widely used to gather information so as to do
the research or add to the knowledge of various subjects. Even the business professionals and the
professions like doctors, access the internet to filter the necessary information for their use. The internet
is therefore the largest encyclopedia for everyone, in all age categories. The internet has served to be
more useful in maintaining contacts with friends and relatives who live abroad permanently.
Q6.
I strongly believe COMELECT lasck IT expertise and with that, cheating may arise from this scenario.
Critics of the Comelec have warned that the automated polls—only less than three months away—could
end up like a “train-wreck" because of numerous delays and setbacks in the poll body’s preparations.
Akbayan Rep. Walden Bello said time is running out for Comelec to make the voters trust the automated
elections system.
“We honestly do not know where the Comelec is going to. Voter education is lagging. Fear of participating
in the polls is widespread among those unfamiliar with the voting system and the Comelec is unable to
assuage people’s fears," Bello told reporters at a press conference in Quezon City on Thursday.
Seven out of 10 Filipinos say they have no or little knowledge about the Philippines’ first nationwide
automated elections, according to a recent Pulse Asia survey.
Delays in the delivery of thousands of Precinct Count Optical Scan (PCOS) machines, the incomplete
training of the precinct-level boards of election inspectors, and the pending review of the source code by
individual stakeholders are complicating the Comelec’s problem, according to Bello.
“The election is a train-wreck waiting to happen," he said.
‘Fossilized’ website
Akbayan legal counsel Ibarra Gutierrez claims that the Comelec’s “fossilized" website is itself an indication
that the poll body “is at a loss" on how to smoothen out possible chokepoints in the voting system.
The content of the website has not been updated, according to Gutierrez. He said the site should have
contained a timeline for automated election preparations and a comprehensive continuity plan.
In recent days, the Comelec website has either been very slow to load or ends the connection attempt
with this error message: “ERROR: The requested URL could not be retrieved; Connection failed; (110)
Connection timed out."
Q7.
The Department of Information Technology is the central IT organization that oversees the technology
infrastructure for government, the risks, and innovations.. It is this infrastructure that enables to deliver
vital services to residents and businesses. The Department is responsible for providing the following:
Technology standards and policies.
Election system
A secure information technology infrastructure that supports local and wide area network access.
Technology recommendations and assistance related to streamlining Department and Agency internal
work processes to increase efficiencies and improve service to the public.
A support team responsible for providing day-to-day support for our clients to ensure that services are
continuously operational and align with their requirements.
Data center services
Telecommunications services (voice and data solutions)
Information Security
Network and desktop administration and management
Application software
Wireless network design and management
Graphical Information Systems (GIS)
Remote data interfaces
Disaster Recovery
Contract and project management services
Intranet and associated productivity tools
Q. 8
IT experts overall in the Philippines are relatively low and behind due to the slow innovations and
political hindrances to improve it. I would say improving the IT education and internet strength will
greatly make a difference. You can see that just at the public high school setting. Good programs like
additional facilitates would be developed and provided. The government is trying but still behind. The
Philippine is one of developing countries in which you can find typical developmental problems, such as
unemployment, poverty, pollution and other life threatening issues. One of these problems is a digital
divide between the urban and rural schools. While the twelve million students at public elementary
school have no government-implemented access to ICT, the some one million pupils at private schools
may have access through community and voluntary initiatives. For example, the Catholic Church is
working to wire some of its elementary schools while private charities such as the Ayala Foundation
provide some schools with computers. The government of the Philippines planed to set up a peoplecentered inclusive and development-oriented information society, where everyone can create, access,
utilize and share information and knowledge. In 2002, the Department of Education started to
implement the Basic Education Curriculum (BEC) where ICT was
integrated. The BEC encourages ICT to focus on the following areas: school computerization, teacher
training,
IT curriculum development, multimedia content development, financing, and monitoring-evaluation.
Thus,
latest movement in the Department of Education, ICT is introduced as a subject Home Economics and
Livelihood Education (HELE) in the elementary levels, and as Technology and Home Economics (THE) in
the
secondary level (Magno, 2006). The following policies on the use of ICT in education are mentioned by
the
Department of Education.
・ Technology must be studied as a separate subject, and then applied to other learning areas as a tool
for
learning how to learn.
・ Teaching-learning must not be textbook-driven but should include the application of ICT, whenever
appropriate.
・ An education modernization program will equip schools with facilities, equipment, materials and
skills, and
introduce new learning and delivery system, capitalizing on recent technological developments.
Even the government enforces the strict policies, there are still extensive gaps between urban and rural
areas. In urban area, schools can easily receive various support and merit, such as Internet connection,
system
support, and cooperation with universities. On the other hand, in rural area schools cannot so easily
receive
those supports
Download