Fill This Form To Receive Instant Help
Homework answers / question archive / Sullivan UniversityCOMPUTER A 218 1)Information security has more to do with management than with technology? 2
Sullivan UniversityCOMPUTER A 218
1)Information security has more to do with management than with technology?
2. Why do we need an IP (Intellectual Property) system?
3. Is computer software copyrightable? Yes or No Why?
4. What are the differences between copyright and trademark protection?
5. What are patent rights?
6. What comes to mind when you hear the word ' hackers'?
7. Is Internet hacking a form of Cyber terrorism?
8. The evolution of hacking is also a good idea?
9. What are the different kinds of hacking? Show them and give examples to each one.
10. How did the history of the Internet's formation shape its security concerns today?
11. What Is Meant By Malware?
12. How Malware Spreads?
Answers:
1.Information security has more to do with management than with technology?
yes because Managing information security has more to do with policy and its enforcement than with technology of its implementation. Organization's communities of interest must address information security in terms of business impact and the cost of business interruption, rather than focusing on security as a technical problem.
2.Why do we need an IP (Intellectual Property) system?
whe need IP ssytem because Without protection of ideas, businesses and individuals would not reap the full benefits of their inventions and would focus less on research and development.
3. Is computer software copyrightable? Yes or No Why?
yes because Copyright Law defines computer programs as literary work, and as such is protectable under copyrights. For example, computer programs are sets of instructions expressed in words, codes, schemes or other forms, including a machine readable medium, capable of causing a computer to perform a particular task or achieve a particular result.
4.What are the differences between copyright and trademark protection?
Copyrights primarily protect the rights of people who create literary, dramatic, musical, artistic, and certain other intellectual works (like history tests, and software code).
while Trademarks protect the use of a company's name and its product names, brand identity (like logos) and slogans.
5.What are patent rights?
patent rights is a protection to the invention that cannot be commercially made, used, distributed, imported, or sold by others without the patent owner's consent.
6.What comes to mind when you hear the word \' hackers\'?
The first thing comes in my mind is a person wearing hoody jacket facing a computer with a bunch of code
and cybercriminal who uses their programming expertise to break into corporate and private systems to steal data.
7.Is Internet hacking a form of Cyber terrorism?
yes because Cyberterrorism can be also defined as the intentional use of computers, networks, and public internet to cause destruction and harm for personal objectives.
8.The evolution of hacking is also a good idea?
yes it good like white-hat hackers can be a great addition to your security system, especially if you faced problems with it in the past. Firstly, they have the freshest insights and keep up with the latest technologies.Last but not least, they can make your system not only secure, but also more efficient.
9.What are the different kinds of hacking? Show them and give examples to each one
Black Hat Hackers are the "bad guys" of the hacking scene. They go out of their way to discover vulnerabilities in computer systems and software to exploit them for financial gain or for more malicious purposes, such as to gain reputation, carry out corporate espionage, or as part of a nation-state hacking campaign.
These individuals' actions can inflict serious damage on both computer users and the organizations they work for. They can steal sensitive personal information, compromise computer and financial systems, and alter or take down the functionality of websites and critical networks.
White Hat Hackers is the "good guys" who attempt to prevent the success of black hat hackers through proactive hacking. They use their technical skills to break into systems to assess and test the level of network security, also known as ethical hacking. This helps expose vulnerabilities in systems before black hat hackers can detect and exploit them.
The techniques white hat hackers use are similar to or even identical to those of black hat hackers, but these individuals are hired by organizations to test and discover potential holes in their security defenses.
Grey Hat Hackers
Grey hat hackers sit somewhere between the good and the bad guys. Unlike black hat hackers, they attempt to violate standards and principles but without intending to do harm or gain financially. Their actions are typically carried out for the common good. For example, they may exploit a vulnerability to raise awareness that it exists, but unlike white hat hackers, they do so publicly. This alerts malicious actors to the existence of the vulnerability.
10.How did the history of the Internet's formation shape its security concerns today?
now a day many company make security product example of mccafe internet security solutions. for the purpose of safeguarding users from threats such as hacking into computer systems, email addresses, or websites; malicious software that can infect and inherently damage systems; and identity theft by hackers who steal personal data such as bank account information and credit card numbers.
11. What Is Meant By Malware?
Malware in computer is a malicious software that destroys the computer data and operating system. It often disguises as a harmless file to deceive the user. Once it's installed,
it replicates fast and infects the other computers within the network.
If malware in computer remains undetected, it may lead to a computer malfunction.
12. How Malware Spreads?
Malware spreads in computer when you download or install an infected software. They also enter your computer through an email or a link. Once malware enters the computer, it attaches itself to different files and overwrites the data.
Some malware are to be executed before it's activated, but some spread immediately. As malware travels within the network, it infects the computer it moves into.