Information Technology Tools and Network Basis
Overview of Future Skills and Cyber Security Question & Answer
Question : 1
What is Computer Ethics?
Answer :
Computer ethics deals with the procedures, values and practices that govern the process of
consuming computing technology and its related disciplines without damaging or violating the
moral values and beliefs of any individual, organization or entity.
Question : 2
What is Software Piracy? How does shareware deal with software piracy?
Answer :
Software piracy is used to describe the act of illegally using, copying or distributing software without ownership or legal rights.
Shareware is a good way to market software. It allows consumers to evaluate an application
prior to making a purchase decision. They can easily determine if it meets their business or
personal needs, which usually results to a satisfied customer.
Question : 3
Why do you think in developing countries like India, it is difficult to stop software piracy?
Answer :
Software piracy is hard to stop for several reasons:
- It’s not a violent crime, so eliminating the criminals by killing them is not really an option. As such, the only remaining option is a legal approach - charging them with a crime and threatening them with prison if they don’t quickly agree to a guilty plea.
- Software piracy is very easy. If you want your software to work without internet connection, then you need to put the entire code and all the data into the hands of a users; consequently, any anti-piracy measures have to be in their hands as well, making it possible for smart coders to reverse-engineer your code, find the part which performs verification of “license to use”, and remove or twist that part so that the software works without a license.
- Sharing cracked software is ludicrously easy and hard to detect.
- There are millions of people involved in this. Quite literally, not only your prisons, but your court-rooms as well are not big enough to realistically charge everyone. So you have to prioritize who you will go after.
- Experts still can’t agree to what extent is piracy harmful. There were numerous cases where a pirated version of something was instrumental in making it popular, which not only later led people to buy a legal copy, but generated interest in a sequel, which then became massive hit.
- People who can afford buying movies and games generally do so; people who cannot afford it will either pirate them, or not get them at all.
- The price tag associated with a legal software is generally high.
Question : 4
What are the different ways of stopping Software Piracy?
Answer :
The different ways to stop software piracy are:
- Educate your staff on the licensing requirements of your software purchases
- Conduct a self-audit of your software licenses
- Acquire any licenses needed for full compliance
- The most widely used method is the license key; code that is built into an application to require
a valid key to unlock the software.
Question : 5
How does Spamming affect economically?
Answer :
Spamming remains economically viable because advertisers have very little or sometimes no
operating costs beyond the management of their mailing lists, and it is almost impossible to
hold senders accountable for their mass mailings. On the other hand it costs huge to the sender
and may sometime even get dubbed.
Question : 6
How can spamming be reduced?
Answer :
By using these precautions you can greatly mitigate what spam you do receive and prevent most spam from ever happening.
- Be careful where you enter your email at.
- Create or use disposable email addresses for websites you do not trust.
- Never open spam when you receive it.
- Keep your computer virus and malware free.
- If your friends are sending you emails sent to a large recipient list, request that they use BCC instead of TO or CC, so that other recipients cannot see your email address; or request they stop including you if you do not want to receive the emails.
- Do not list your email address on your website or anywhere the public can access it.
Question : 7
How is phishing and pharming performed to perform Cybercrime?
Answer :
Phising is a fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Pharming is the fraudulent practice of directing Internet users to a bogus website that mimics
the appearance of a legitimate one, in order to obtain personal information such as passwords,
account numbers, etc.
Question : 8
What are the different types of Cybercrimes?
Answer :
The different types of cyber crime are:
- Financial fraud crimes
- Cyberterrorism
- Cyberextortion
- Cyberwarfare
- Computer as a target
- Computer as a tool
Question : 9
How are Hackers different from Crackers?
Answer :
Hackers are those computers experts which breaks into computers to check any vulnerably so that no one can misuse the services. These are really intelligent and smart persons who use there ability to protect the community from cyber crimes and computer thefts.
Whereas, Crackers are those peoples who use there knowledge to do computer crimes for
gaining popularity among peoples and to earn fast money. They break into computer networks
for their enjoyment and cause harm to them. These persons does not have real knowledge and
know something about using the particular software to break into computers.
Question : 10
What is the need for secure passwords?
Answer :
A password that is difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access. A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically case-sensitive, so a strong password contains letters in both uppercase and lowercase. Strong passwords also do not contain words that can be found in a dictionary
Question : 11
What is Authentication and Authorization? Why are these two used together?
Answer :
Difference between Authentication and Authorization. Both the terms are often used in conjunction with each other in terms of security, especially when it comes to gaining access to the system. Authentication means confirming your own identity, while authorization means granting access to the system.
Question : 12
What are denial-of-service or Sweeper attack?
Answer :
A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.
Question : 13
What do you understand by PC intrusion?
Answer :
Intrusion - Computer Definition. To compromise a computer system by breaking the security of such a system or causing it to enter into an insecure state. The act of intruding—or gaining unauthorized access to a system—typically leaves traces that can be discovered by intrusion detection systems.
Question : 14
What are malware? What type damages can they cause to your computer?
Answer :
"Malware" is short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand-alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.
Question : 15
What type damages can be caused by viruses to your computer?
Answer :
Damages caused by Viruses:
– Damage or Delete files.
– Slow down your computer.
– Invade your email programs.
Question : 16
What are different types of threats to computer security?
Answer :
A Threat is a potential violation of security. When a threat is actually executed, it becomes attack. Those who execute such actions, or cause them to be executed are called attackers.
Some common threats the average computer user faces everyday are:
1. Viruses
2. Worms
3. Trojans
4. Spyware
5. Adware
6. Spamming
7. PC Intrusion:
8. Denial of Service
9. Sweeping
10. Password Guessing
11. Phishing
Question : 17
What is Computer virus? How can it affect your computer?
Answer :
A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.
Question : 18
How is backup utility useful? Is it necessary to take backup of data?
Answer :
Backup is a very helpful utility. You can backup your data with that and whenever your data is corrupted by any virus or Trojans your data will remain safe.
It is not necessary to backup your until or unless you have something really important stuff in your machine.The backup depends on your wish if you want to make backup, go on for it and if you don't leave it. But if you have something very useful for you in future then its better to take backup.
Question : 19
What is a virus? What is anti-virus software?
Answer :
A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.
Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more
Question : 20
What is digital footprint? Why is it so important?
Answer :
A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services. A "passive digital footprint" is a data trail you unintentionally leave online.
It is not a matter of gathering one person‘s online activity. The main concern is what the person is doing. If he or she is going to a dark path then the online activity is the first thing that will provide a glimpse of it. The matter is serious and digital footprint is going to provide the fullest information on it. Apart from gathering information the digital footprint provides knowledge on what the person likes and how well the orientation of his mind is. If you find that your friend and beloved family member is posting something obnoxious and disgraceful in a continuous manner then you can stop him from going to the dark path. In this technical society a digital footprint can give you full information of what the person is thinking. Regardless of all thoughts of getting diverted from the prime goal, one person should keep a track of all the information of his online activity. Nowadays, when technology has become too much available and influencing all the activities in a regular manner, keeping it at a side and thinking without the influence of it has become impossible that is why analysis of your digital footprint is highly necessary. This will provide you valuable information on what you are doing and what should be avoided by you.
Question : 21
What is identity fraud?
Answer :
Identity fraud is the use by one person of another person's personal information, without authorization, to commit a crime or to deceive or defraud that other person or a third person.
Question : 22
What is cyber bullying and cyber stalking?
Answer :
Cyber stalking is the use of the Internet or other electronic means to stalk or harass an individual, group, or organization. It may include false accusations, defamation, slander and libel. It may also include monitoring, identity theft, threats, vandalism, solicitation for sex, or gathering information that may be used to threaten, embarrass or harass.
Cyber bullying or cyber harassment is a form of bullying or harassment using electronic means. Cyber bullying and cyber harassment are also known as online bullying. It has become increasingly common, especially among teenagers. Cyber bullying is when someone, typically teens, bully or harass others on social media sites. Harmful bullying behavior can include posting rumors, threats, sexual remarks, a victims' personal information, or pejorative labels (i.e., hate speech). Bullying or harassment can be identified by repeated behavior and an intent to harm. Victims may have lower self-esteem, increased suicidal ideation, and a variety of emotional responses, including being scared, frustrated, angry, and depressed.
Question : 23
What is cyber safety?
Answer :
Using internet with care and responsibility is called Cyber Safety so that we can keep our personal information safe.
Question : 24
What is cloud computing?
Answer :
cloud computing is the delivery of computing services—servers, storage, databases, networking, software, analytics, intelligence and more—over the Internet (―the cloud‖) to offer faster innovation, flexible resources and economies of scale. You typically pay only for cloud services you use, helping lower your operating costs, run your infrastructure more efficiently and scale as your business needs change.
Cloud computing is a big shift from the traditional way businesses think about IT resources. Here are seven common reasons organizations are turning to cloud computing services.