Uploaded by hananhusainibrahim22

Assignment

advertisement
Foundation in Cyber Security
Individual Assignment (Report) – 20%
Prepared by:
Name - Hanan Husain | Student No. DFCS/DK/71/221
Due Date: 25/07/2023
1
Question 01
01
i.
The Shell.

ii.
In the context of Linux and Unix like operating systems, the shell refers
to a command-line interface (CLI) program that interprets and executes
user commands
Relative path.

iii.
In Linux /Unix system (and also applicable to windows), a relative path
refers to the path to a file or directory relative to the current working
directory. The current working directory is the is the directory in which
the user is currently located within the file system when using the terminal
or shell.
Command Parameters.

In the context of Linux/Unix commands, command parameters (also
known as command-line arguments or options) are additional pieces of
information or settings provided to a command to modify its behavior or
specify what operation it should perform. When executing a command in
the terminal, you can pass one or more parameters after the command
name to control its actions or provide input to the command.
02
i.
Touch

ii.
The “touch” command is used to create an empty file or update the
timestamp of an existing file without modifying its content.
Cat

The “cat” command is used to display the contents of a file or multiple
file and print the result.
2
03
01. The creation of the minx operating system by Andrew S. Tanenbaum as an
educational tool.
02. Richard Stallman’s initiation of the Free Software Foundation and the GNU
Project, which aimed to develop a free Unix-like operating system.
03. Linus Torvalds announcement of the Linux kernel in 1991, filling the missing
piece of the GNU operating system.
04. The collaborative effort of developers worldwide contributing to Linux’s
growth, turning it into a robust and widely-used open-source operating system.
Question 02
i.
The internet

ii.
IP address

iii.
The internet is a vast global computer network that connects millions of
computers and devices worldwide. It provides a wide range of
information and communication services, allowing users to access
websites, send emails, share files, communicate through instant
messaging and video calls, and much more.
An IP address is a numerical label assigned to each device connected to
computer network that uses the internet protocol for communication. It
serves two primary purposes; identifying the host or network interface
and providing the location of the device in the network.
HTML

HTML (Hypertext Markup Language): HTML is the standard markup
language used to create and structure content on the World Wide Web. It
is the backbone of webpages and is interpreted by web browsers to
display text, images, links, multimedia and other elements on website.
3
02
i.
Internet

ii.
The internet is a global network of interconnected computer networks,
which spans the entire world and allows various devices and system to
communicate and share information using standardized protocols.
Web

Web is the subset of the internet and is collection of interconnected
hypertext documents and recourses accessible through the internet.
03
The examples of netiquette are:
1. Use Proper Language and Tone: When communicating online, it’s essential
to use appropriate language and tone. Avoid using all caps, as it may be
perceived as shouting. Be respectful and avoid using offensive language or
personal attacks.
2. Be Mindful of Sharing and Privacy: Respect others’ privacy when posting or
sharing information online. Avoid sharing personal details about others without
their consent. Be cautious when sharing sensitive or private information about
yourself, as the internet is public space, and your data may be accessible to a
wider audience.
4
Question 03
1. What is the internet?
 The internet is a global network of interconnected computer networks
that spans the entire world. It allows various devices and systems to
communicate and share information using standardized communication
protocols.
2. Differentiate data and information?
 Data: Data refers to raw, unorganized facts or figures, often in the form
of numbers, text, or symbols. It lacks contest and meaning on its own.
 Information: Information is processed, organized, and meaningful data.
It is the result of data being interpreted or analyzed in a specific context,
making it useful for decision-making or understanding.
3. Four examples of web browser:
 Google chrome
 Mozilla Firefox
 Microsoft Edge
 Apple Safari
4. What is a computer virus? And how does the virus spread?
 A computer virus is a type of malicious software that attaches itself to
legitimate programs or files and spreads from one computer to another
computer, often without the user’s knowledge or consent.
 Virus spread: Computer viruses can spread through various means such
as;
 Email attachments: Infected files attached to emails can spread
the virus when the recipient opens the attachment.
 Infected websites: Visiting compromised websites or
downloading files from untrusted sources can lead to virus
infections.
5. What is Linux? And list four names of Linux Distributions:
 Linux: Linux is an open-source operating system based on the Unix
kernel. It provides users with a free and customizable operating system.
It is widely used in various devices, from severs and supercomputers to
desktop computers and smartphones.
 Four Linux Distributions:
 Ubuntu
 Fedora
 Debian
 CentOS
5
Question 04
1. CIS Triad:
 The CIA Triad is a fundamental concept in information security that
represents the three core principles for ensuring the security of
information and data.
2. Short notes on two security threats:
 Viruses: Viruses are malicious programs that attach themselves to
legitimate files or programs and spread from one system to another,
usually through infected files or software.
 Ransomware: Ransomware is a type of malware that encrypts a victim’s
data, making it inaccessible until a ransom is paid to the attacker.
3. Define Authentication, Authorization and Nonrepudiation:
 Authentication: Authentication is a process of verifying the identity of a
user, devise, or system component attempting to access a resource or
perform an action.
 Authorization: Authorization follows authentication and determines the
level of access and permissions granted to authenticated users or system.
4. Email security best practices:
 Use strong passwords: Create strong and unique passwords for email
accounts, and consider using multifactor authentication (MFA) for an
extra layer of security.
6

7
Download