BLOGGER TEMPLATES AND TWITTER BACKGROUNDS
Suria, 4Utarid, one of the ICT's hard fans ! xDD I enjoy learning ICT but somehow, I got problems sometimes when learning it, Well people, nobody's perfect right, so this blog will tell you guys about the reflection on my side after learning it, Warmly welcome XOXO (=_=)

Wednesday, February 3, 2010

Assignment 2

People interact directly with computer in many field in our daily life.ICT help people in managing several sectors.But we have threats to computer such as viruses and natural disasters.

a.Name 4 main sectors that used ICT in their management
Education
Banking system
Industry
Commerce

b.State 2 differences between Worm and Viruses

Worm

Virus

Operates through the network

Spreads through any medium

Spreads copies of itself as a standalone program

Spreads copies of itself as a program that attaches to other

programs







c.There are 6 type of security measures that can be use to protect our computer.Explain what is;

i.Cryptography
Cryptography is a process of hiding information by altering the actual information into different representation, for example, an APA can be written as I? X.Almost all cryptosystems depend on a key such as a password like the numbers or a phrase that can be used to encrypt or decrypt a message.The traditional type of cryptosystem used on a computer network is called a symmetric secret key system.

ii. Firewall
Firewall is a piece of hardware or software which functions in a networked environment to prevent some communications forbidden by the securitpolicy.Firewall implement a security policy. It might permit limited access from in or outside the network perimeters or from certain user or for certain activities.

TYPES OF FIREWALL

SCREENING ROUTERS

PROXY GATEWAY

GUARD

Simplest

Somewhat complex

Most complex

Sees only addresses and service protocol type

Sees full text of communication

Sees full text of communication

Screen based on connection rules

Screen based on behaviour proxies

Screen based on interpretation of message content


0 comments:

Post a Comment