Foundation in Cyber Security Individual Assignment (Report) – 20% Prepared by: Name - Hanan Husain | Student No. DFCS/DK/71/221 Due Date: 25/07/2023 1 Question 01 01 i. The Shell. ii. In the context of Linux and Unix like operating systems, the shell refers to a command-line interface (CLI) program that interprets and executes user commands Relative path. iii. In Linux /Unix system (and also applicable to windows), a relative path refers to the path to a file or directory relative to the current working directory. The current working directory is the is the directory in which the user is currently located within the file system when using the terminal or shell. Command Parameters. In the context of Linux/Unix commands, command parameters (also known as command-line arguments or options) are additional pieces of information or settings provided to a command to modify its behavior or specify what operation it should perform. When executing a command in the terminal, you can pass one or more parameters after the command name to control its actions or provide input to the command. 02 i. Touch ii. The “touch” command is used to create an empty file or update the timestamp of an existing file without modifying its content. Cat The “cat” command is used to display the contents of a file or multiple file and print the result. 2 03 01. The creation of the minx operating system by Andrew S. Tanenbaum as an educational tool. 02. Richard Stallman’s initiation of the Free Software Foundation and the GNU Project, which aimed to develop a free Unix-like operating system. 03. Linus Torvalds announcement of the Linux kernel in 1991, filling the missing piece of the GNU operating system. 04. The collaborative effort of developers worldwide contributing to Linux’s growth, turning it into a robust and widely-used open-source operating system. Question 02 i. The internet ii. IP address iii. The internet is a vast global computer network that connects millions of computers and devices worldwide. It provides a wide range of information and communication services, allowing users to access websites, send emails, share files, communicate through instant messaging and video calls, and much more. An IP address is a numerical label assigned to each device connected to computer network that uses the internet protocol for communication. It serves two primary purposes; identifying the host or network interface and providing the location of the device in the network. HTML HTML (Hypertext Markup Language): HTML is the standard markup language used to create and structure content on the World Wide Web. It is the backbone of webpages and is interpreted by web browsers to display text, images, links, multimedia and other elements on website. 3 02 i. Internet ii. The internet is a global network of interconnected computer networks, which spans the entire world and allows various devices and system to communicate and share information using standardized protocols. Web Web is the subset of the internet and is collection of interconnected hypertext documents and recourses accessible through the internet. 03 The examples of netiquette are: 1. Use Proper Language and Tone: When communicating online, it’s essential to use appropriate language and tone. Avoid using all caps, as it may be perceived as shouting. Be respectful and avoid using offensive language or personal attacks. 2. Be Mindful of Sharing and Privacy: Respect others’ privacy when posting or sharing information online. Avoid sharing personal details about others without their consent. Be cautious when sharing sensitive or private information about yourself, as the internet is public space, and your data may be accessible to a wider audience. 4 Question 03 1. What is the internet? The internet is a global network of interconnected computer networks that spans the entire world. It allows various devices and systems to communicate and share information using standardized communication protocols. 2. Differentiate data and information? Data: Data refers to raw, unorganized facts or figures, often in the form of numbers, text, or symbols. It lacks contest and meaning on its own. Information: Information is processed, organized, and meaningful data. It is the result of data being interpreted or analyzed in a specific context, making it useful for decision-making or understanding. 3. Four examples of web browser: Google chrome Mozilla Firefox Microsoft Edge Apple Safari 4. What is a computer virus? And how does the virus spread? A computer virus is a type of malicious software that attaches itself to legitimate programs or files and spreads from one computer to another computer, often without the user’s knowledge or consent. Virus spread: Computer viruses can spread through various means such as; Email attachments: Infected files attached to emails can spread the virus when the recipient opens the attachment. Infected websites: Visiting compromised websites or downloading files from untrusted sources can lead to virus infections. 5. What is Linux? And list four names of Linux Distributions: Linux: Linux is an open-source operating system based on the Unix kernel. It provides users with a free and customizable operating system. It is widely used in various devices, from severs and supercomputers to desktop computers and smartphones. Four Linux Distributions: Ubuntu Fedora Debian CentOS 5 Question 04 1. CIS Triad: The CIA Triad is a fundamental concept in information security that represents the three core principles for ensuring the security of information and data. 2. Short notes on two security threats: Viruses: Viruses are malicious programs that attach themselves to legitimate files or programs and spread from one system to another, usually through infected files or software. Ransomware: Ransomware is a type of malware that encrypts a victim’s data, making it inaccessible until a ransom is paid to the attacker. 3. Define Authentication, Authorization and Nonrepudiation: Authentication: Authentication is a process of verifying the identity of a user, devise, or system component attempting to access a resource or perform an action. Authorization: Authorization follows authentication and determines the level of access and permissions granted to authenticated users or system. 4. Email security best practices: Use strong passwords: Create strong and unique passwords for email accounts, and consider using multifactor authentication (MFA) for an extra layer of security. 6 7