MIS Experiential Learning
MIS Experiential Learning
MIS Experiential Learning
2. Carrying out penetration tests and vulnerability assessments to find and fix any potential
flaws
4. Using firewalls and antivirus software to guard against viruses and unauthorized network
access
6. Implementing security policies and procedures and frequently training staff members on how
to follow them.
Symmetric encryption and asymmetric encryption are the two major methods of encryption.
Asymmetric encryption employs multiple keys for encryption and decryption, whereas
symmetric encryption uses the same key for both. While symmetric encryption is frequently
used to encrypt data at rest, asymmetric encryption is frequently used for secure
communication.
1. Encrypting private information saved on devices to avoid theft or loss and unauthorized
access
3. Encrypting email attachments and messages to prevent content from being intercepted or
accessed by unauthorized parties.
Ans3: Common types of cybercrimes include:
1. Phishing scams, in which thieves deceive victims into disclosing sensitive information like
passwords or credit card details through emails, phone calls, or other means.
2. Malware attacks, in which criminals employ software to break into systems, steal data, or
harm systems.
3. Ransom ware attacks, in which thieves encrypt data on a system using malware and demand
payment in exchange for the decryption key.
4. Denial of service attacks, in which criminals saturate a system or network with traffic to
prevent authorized users from accessing it.
5. Identity theft, in which thieves open accounts, make purchases, or engage in other illegal
activities using stolen personal information.
6. Online bullying or harassment, in which people threaten or harass others through the
internet.