Assignment: Introduction to Internet and
Computer Security
Part A: Short Questions
1. Define the following terms:
Network: A collection of interconnected computers and devices that
share resources and communicate with each other, often using
communication protocols.
ARPANET: The first packet-switching network, developed in the late
1960s by the U.S. Department of Defense’s ARPA, and considered the
foundation of today’s Internet.
Internet: A global network of interconnected computers that
communicate using TCP/IP protocols, allowing data sharing,
communication, and access to services worldwide.
WWW (World Wide Web): A system of interlinked hypertext
documents accessed through the Internet using web browsers.
Web Browser: A software application (e.g., Chrome, Firefox, Edge)
that retrieves and displays content from the World Wide Web.
2. Differentiate between:
Download and Upload:
o Download is receiving data from the Internet to a local device.
Example: Saving a PDF from Google Drive.
o Upload is sending data from a local device to the Internet.
Example: Posting a photo on Facebook.
Hacker and Cracker:
o Hacker is a skilled programmer who explores systems, often
ethically, to improve security.
o Cracker is someone who breaks into systems illegally to steal or
damage data.
Authentication and Authorization:
o Authentication verifies identity (e.g., entering a username and
password).
o Authorization determines access rights after authentication (e.g.,
an admin can modify files, a guest cannot).
3. Role of HTTP and FTP in Internet communication:
HTTP (Hypertext Transfer Protocol): Used for transferring web
pages and multimedia content between web servers and browsers.
FTP (File Transfer Protocol): Used for uploading and downloading
files between computers over the Internet.
4. Difference between a Web Page and a Website with examples:
Web Page: A single document displayed in a browser (e.g., Google’s
search results page).
Website: A collection of interconnected web pages under one domain
(e.g., www.google.com).
5. Purpose of Encryption with a real-life example:
Encryption ensures data confidentiality by converting readable information into coded form.
Example: Online banking uses encryption (SSL/TLS) to protect users’ credit card details during
transactions.
Part B: Extended Questions
6. Origin and Development of the Internet (from ARPANET):
The Internet originated from ARPANET in 1969, which connected four U.S. universities. It
introduced packet-switching and evolved into a broader research network. In the 1980s, TCP/IP
became the standard protocol, allowing global interconnection. The creation of the World Wide
Web in 1991 by Tim Berners-Lee transformed the Internet into a platform for information
sharing, communication, and e-commerce. Today, it is a global infrastructure supporting billions
of users.
7. Data Security Mechanisms with Examples:
Encryption: Protects data by encoding it (e.g., WhatsApp end-to-end
encryption).
Authentication: Confirms user identity (e.g., logging in with a
password or fingerprint).
Authorization: Grants permissions (e.g., only managers can approve
expenses in a company system).
Auditing: Tracks and logs activities (e.g., reviewing server logs to
detect unauthorized access).
8. Computer Security and Common Threats:
Computer Security: The practice of protecting systems, networks,
and data from theft, misuse, or damage.
Three common threats and prevention:
1. Viruses – Install antivirus software and update regularly.
2. Phishing attacks – Educate users and use email filters.
3. Unauthorized access – Use strong passwords and enable
firewalls.
9. Malware and Its Types:
Malware: Malicious software designed to harm or exploit computer
systems.
Types:
o Virus: Attaches to files and spreads when opened (e.g., Melissa
virus).
o Trojan Horse: Disguised as legitimate software but harmful
(e.g., fake banking apps).
o Worm: Self-replicating malware that spreads via networks (e.g.,
ILOVEYOU worm).
10. Practical Measures for Computer Security in an Organization:
As an IT officer, I would implement:
1. Strong Password Policy – Enforce complex, regularly changed
passwords.
2. Firewall and Antivirus – Protect against malware and network
attacks.
3. Regular Data Backups – Ensure recovery after failures or
ransomware.
4. Access Control – Restrict sensitive data to authorized staff only.
5. User Training – Educate employees on safe browsing, phishing, and
data handling.