Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

University of MelbourneIT VU21990 Q1) State the benefits of backing up data to a cloud-based disk? Q2: What are the drawbacks of backing up data to a local external disk? Q3

Business May 17, 2021

University of MelbourneIT VU21990

Q1) State the benefits of backing up data to a cloud-based disk?

Q2: What are the drawbacks of backing up data to a local external disk?

Q3. What will be one suggestion that you will give to a friend who wants to protect themselves when online?

Q4. Briefly explain each of the following cyber security terms:

a)   Scareware

b)   Spyware

c)   Worm

d)   Virus

e)   Ransonware

f)    DoS

g)   SEO Poisoning

h)   Blended Attack

i)     Exploit

Q5. List three measures that can help protect the computing devices you use at home or work?

 

Expert Solution

Answer:

Q1

  • Easier usability and accessibility.
  • Enhanced security.
  • It is more cost efficient.
  • Easy way of sharing files.
  • Allow usage of multiple users.
  • Facilitate synchronization of both backed up data and available new data.
  • Enhanced availability of thbacked up data.

Q2

  • They are prone to failure in the sense that the external drives are subject to the same data loss risks as internal drives such as viruses and worms.
  • Security is limited since many of the external drives aren't encrypted or password protected.
  • File versioning is difficult to set up on external media, and it requires manual cleanup of old files to allow file versioning.
  • There is high initial cost of setting up compared to cloud backup since the expense of hardware is more compared to preparing for a cloud based platform since disks are costly.
  • The cost of maintenance is high because it requires dedicated employee to maintain and manage it.

Q3

Make sure to use safe and strong passwords to ensure that they don't get hacked.

 

Q4

a)   Scareware

is a cybercrime scam in which cybercriminals trick a user into buying fake antivirus software by gaining access to your credit card information, and often your computer itself.

 

b)   Spyware

is a software that installs itself on your computer and starts  monitoring your online behavior without your  permission and also start stealing your the online data and other sensitive information.

 

c)   Worm

It is a malicious computer program that replicates itself in order to spread to other computers and mostly uses the computer network as a roadmap.

 

d)   Virus

Is a malicious computer program that is designed to spread from device to device with the aim of damaging a device or stealing valuable data.

 

e)   Ransonware

It is a malicious software hackers use to restrict you from accessing your own data and encrypting the files on your system to ensure you comply with there demands before they decrypt your system 

 

f)    DoS

A Denial-of-Service is an attack that is purposely meant to shut down a machine, network from accessing its resources there by making it inaccessible to its intended users to use the system.

 

g)   SEO Poisoning

It is an attack technique that leads to the creation of web pages full of trending keywords in an effort to trick search engines to get a higher ranking in search results.

 

h)   Blended Attack

It is an attack that tries to infiltrate a system using multiple attack options and may use an infected machine to launch attacks against other systems.

 

i)     Exploit

is a part of a program code that takes advantage of a software vulnerability which may be used to channel an attack.

 

Q5

  • Install and use firewall to protect against malicioys traffics.
  • Install an Antivirus to ensure that you are protected against viruses.
  • Use of strong passwords to protect private data and unauthorised information access

Reference

Menard, P., Gatlin, R., & Warkentin, M. (2014). Threat protection and convenience: Antecedents of cloud-based data backup. Journal of Computer Information Systems, 55(1), 83-91.

Zrnec, A., & Lavbi?, D. (2011). Comparison of Cloud vs. Tape Backup Performance and Costs with Oracle Database. Journal of Information and Organizational Sciences, 35(1), 135-142.

Sharma, K., & Singh, K. R. (2012). Online data back-up and disaster recovery techniques in cloud computing: A review. International Journal of Engineering and Innovative Technology (IJEIT), 2(5), 249-254.

Holtfreter, R. E. (2011). Scareware Fraud: All Trick and No Treat?(Part One). Fraud Magazine.

Wazid, M., Katal, A., Goudar, R. H., Singh, D. P., Tyagi, A., Sharma, R., & Bhakuni, P. (2013, January). A framework for detection and prevention of novel keylogger spyware attacks. In 2013 7th International Conference on Intelligent Systems and Control (ISCO) (pp. 433-438). IEEE.

Lockwood, J. W., Moscola, J., Reddick, D., Kulig, M., & Brooks, T. (2003, December). Application of hardware accelerated extensible network nodes for internet worm and virus protection. In IFIP International Working Conference on Active Networks (pp. 44-57). Springer, Berlin, Heidelberg.

Brewer, R. (2016). Ransomware attacks: detection, prevention and cure. Network Security, 2016(9), 5-9.

Borisov, N., Danezis, G., Mittal, P., & Tabriz, P. (2007, October). Denial of service or denial of security?. In Proceedings of the 14th ACM conference on Computer and communications security (pp. 92-102).

Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., & Wu, Q. (2014, June). AVOIDIT: A cyber attack taxonomy. In 9th Annual Symposium on Information Assurance (ASIA'14) (pp. 2-12).

Buchanan, T., Paine, C., Joinson, A. N., & Reips, U. D. (2007). Development of measures of online privacy concern and protection for use on the Internet. Journal of the American society for information science and technology, 58(2), 157-165.

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment