[go: up one dir, main page]

0% found this document useful (0 votes)
14 views4 pages

Ema Computer Assignment

Cool

Uploaded by

abraham worku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views4 pages

Ema Computer Assignment

Cool

Uploaded by

abraham worku
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Assignment: Introduction to Internet and

Computer Security

Part A: Short Questions

1. Define the following terms:

 Network: A collection of interconnected computers and devices that


share resources and communicate with each other, often using
communication protocols.
 ARPANET: The first packet-switching network, developed in the late
1960s by the U.S. Department of Defense’s ARPA, and considered the
foundation of today’s Internet.
 Internet: A global network of interconnected computers that
communicate using TCP/IP protocols, allowing data sharing,
communication, and access to services worldwide.
 WWW (World Wide Web): A system of interlinked hypertext
documents accessed through the Internet using web browsers.
 Web Browser: A software application (e.g., Chrome, Firefox, Edge)
that retrieves and displays content from the World Wide Web.

2. Differentiate between:

 Download and Upload:


o Download is receiving data from the Internet to a local device.
Example: Saving a PDF from Google Drive.
o Upload is sending data from a local device to the Internet.
Example: Posting a photo on Facebook.

 Hacker and Cracker:


o Hacker is a skilled programmer who explores systems, often
ethically, to improve security.
o Cracker is someone who breaks into systems illegally to steal or
damage data.

 Authentication and Authorization:


o Authentication verifies identity (e.g., entering a username and
password).
o Authorization determines access rights after authentication (e.g.,
an admin can modify files, a guest cannot).

3. Role of HTTP and FTP in Internet communication:

 HTTP (Hypertext Transfer Protocol): Used for transferring web


pages and multimedia content between web servers and browsers.
 FTP (File Transfer Protocol): Used for uploading and downloading
files between computers over the Internet.

4. Difference between a Web Page and a Website with examples:

 Web Page: A single document displayed in a browser (e.g., Google’s


search results page).
 Website: A collection of interconnected web pages under one domain
(e.g., www.google.com).

5. Purpose of Encryption with a real-life example:


Encryption ensures data confidentiality by converting readable information into coded form.
Example: Online banking uses encryption (SSL/TLS) to protect users’ credit card details during
transactions.

Part B: Extended Questions

6. Origin and Development of the Internet (from ARPANET):


The Internet originated from ARPANET in 1969, which connected four U.S. universities. It
introduced packet-switching and evolved into a broader research network. In the 1980s, TCP/IP
became the standard protocol, allowing global interconnection. The creation of the World Wide
Web in 1991 by Tim Berners-Lee transformed the Internet into a platform for information
sharing, communication, and e-commerce. Today, it is a global infrastructure supporting billions
of users.

7. Data Security Mechanisms with Examples:


 Encryption: Protects data by encoding it (e.g., WhatsApp end-to-end
encryption).
 Authentication: Confirms user identity (e.g., logging in with a
password or fingerprint).
 Authorization: Grants permissions (e.g., only managers can approve
expenses in a company system).
 Auditing: Tracks and logs activities (e.g., reviewing server logs to
detect unauthorized access).

8. Computer Security and Common Threats:

 Computer Security: The practice of protecting systems, networks,


and data from theft, misuse, or damage.
 Three common threats and prevention:
1. Viruses – Install antivirus software and update regularly.
2. Phishing attacks – Educate users and use email filters.
3. Unauthorized access – Use strong passwords and enable
firewalls.

9. Malware and Its Types:

 Malware: Malicious software designed to harm or exploit computer


systems.
 Types:
o Virus: Attaches to files and spreads when opened (e.g., Melissa
virus).
o Trojan Horse: Disguised as legitimate software but harmful
(e.g., fake banking apps).
o Worm: Self-replicating malware that spreads via networks (e.g.,
ILOVEYOU worm).

10. Practical Measures for Computer Security in an Organization:


As an IT officer, I would implement:

1. Strong Password Policy – Enforce complex, regularly changed


passwords.
2. Firewall and Antivirus – Protect against malware and network
attacks.
3. Regular Data Backups – Ensure recovery after failures or
ransomware.
4. Access Control – Restrict sensitive data to authorized staff only.
5. User Training – Educate employees on safe browsing, phishing, and
data handling.

You might also like