Q1) Why do we need security and privacy in computer network
Security and privacy are vital in computer networks to safeguard sensitive data
from unauthorized access and misuse. Security protocols are designed to prevent
data from being altered or deleted by those without proper authorization. Privacy
safeguards ensure that personal information is kept confidential and not shared
without consent. These measures are essential for the smooth and reliable
operation of networks, building user trust in the services provided. By
implementing these protections, we help prevent fraud, protect individual rights,
and guarantee that only authorized individuals can access critical data.
Q2) What are the disadvantages of securities
Cost: Implementing robust security and privacy measures can be expensive.
Businesses need to invest in technology, software, and skilled personnel to
maintain these measures effectively.
Performance Impact: Some security measures can slow down system
performance. For example, encryption and decryption processes require
additional computing resources, which can reduce the speed of data
processing and transmission.
Complexity: Managing and maintaining security and privacy can be
complex, especially in large organizations with vast amounts of data and
numerous users. This complexity can lead to errors and vulnerabilities if not
handled properly.
User Inconvenience: Strong security protocols often require users to take
additional steps, like undergoing multifactor authentication or regularly
changing passwords. While necessary, these measures can be inconvenient
and frustrating for users.
Potential for Overreach: In efforts to secure systems and data, some
privacy measures might excessively monitor or restrict user activities,
potentially infringing on personal freedoms and privacy.
Q3) What are the different threats ( malwares) to security and privacy?
explain these briefly.
Malware, an abbreviation for "malicious software," encompasses any software
created to damage or take advantage of any programmable device, service, or
network. This category includes various destructive types like viruses, worms,
spyware, and ransomware. Malware's capabilities range from stealing, deleting,
encrypting, or modifying data to monitoring and controlling user actions and
disrupting the normal operations of systems and devices. It commonly propagates
via infected email attachments, malicious websites, or software vulnerabilities. To
guard against malware, it is essential to use antivirus software, regularly update
all software, and adopt secure browsing and downloading practices.
Ransomware: a kind of malware that encrypts or locks user data and then
requires payment to unlock or decrypt it.
Worm: a type of malware capable of self-replication and autonomously
spreading to other devices across a network.
Trojan: a type of malware that masquerades as safe software but executes
harmful activities once installed on a computer.
Adware: a form of malware that automatically presents or downloads
advertisements when a user is active online, typically without user consent.
Spyware: a variety of malware that clandestinely collects data from a
person's or organization's computer without their knowledge.
Q4) What are the different ways to achieve the security.
Security can be ensured through three primary methods: physical, authentication,
and authorization.
1. Physical: This method focuses on safeguarding hardware and premises from
physical damage or theft. Measures often include locks, security personnel,
biometric devices, and surveillance cameras.
2. Authentication: This step verifies the identity of a user, device, or other
entities to ensure they are who they claim to be before granting access to a
computer system. Common techniques used are passwords, biometric
verification, and security tokens.
3. Authorization: After verifying identity through authentication, authorization
determines whether the verified entity has the right to access specific
resources. This is governed by security policies and implemented via
mechanisms like access control lists or defined user roles that outline
permissions.
Q5) What the different ways to secure the privacy.
Various methods can be used to enhance privacy protection. Data encryption is
crucial, converting data into a format that can only be read by those with the
appropriate decryption key. Employing strong, unique passwords and updating
them frequently can block unauthorized entries. Two-factor authentication
provides an additional security layer by needing a second verification form.
Keeping software up-to-date ensures that the newest security fixes are in place.
Adjusting privacy settings on devices and apps can also reduce the amount of
personal information shared. By adopting these strategies, one can safeguard
personal data against unauthorized access and potential abuse.