Nothing Special   »   [go: up one dir, main page]

MIS Experiential Learning

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

Ans1: By employing sound IT security procedures like these, businesses can protect themselves

from software flaws:

1. Consistently patching and updating software to fix known flaws

2. Carrying out penetration tests and vulnerability assessments to find and fix any potential
flaws

3. Using multi-factor authentication and strong passwords to prevent unauthorized access

4. Using firewalls and antivirus software to guard against viruses and unauthorized network
access

5. Using encryption to secure sensitive data.

6. Implementing security policies and procedures and frequently training staff members on how
to follow them.

Ans2: To prevent unauthorized access or interception, data encryption involves turning


plaintext data into cipher text. The data is converted into cipher text using encryption
techniques, and the cipher text must be converted back into plaintext using the same key. Data
can be secured using encryption both while it is in transit and while it is at rest.

Symmetric encryption and asymmetric encryption are the two major methods of encryption.
Asymmetric encryption employs multiple keys for encryption and decryption, whereas
symmetric encryption uses the same key for both. While symmetric encryption is frequently
used to encrypt data at rest, asymmetric encryption is frequently used for secure
communication.

There are several ways to employ encryption as a security precaution, including:

1. Encrypting private information saved on devices to avoid theft or loss and unauthorized
access

2. Using encryption to protect data sent via networks from eavesdropping

3. Encrypting email attachments and messages to prevent content from being intercepted or
accessed by unauthorized parties.
Ans3: Common types of cybercrimes include:

1. Phishing scams, in which thieves deceive victims into disclosing sensitive information like
passwords or credit card details through emails, phone calls, or other means.

2. Malware attacks, in which criminals employ software to break into systems, steal data, or
harm systems.

3. Ransom ware attacks, in which thieves encrypt data on a system using malware and demand
payment in exchange for the decryption key.

4. Denial of service attacks, in which criminals saturate a system or network with traffic to
prevent authorized users from accessing it.

5. Identity theft, in which thieves open accounts, make purchases, or engage in other illegal
activities using stolen personal information.

6. Online bullying or harassment, in which people threaten or harass others through the
internet.

You might also like