SCL 2: COMPUTER SOFTWARE
Posted by Unknown
SCL 2: COMPUTER SOFTWARE
1.
- What is Open Source Software?
- · In your opinion, why people prefer open source software over proprietary alternatives nowadays?
- · Name top (fives) 5 most popular open source software and compare them with similar proprietary software (e.g. Open Office versus Microsoft Office).
- Ø Open source software is computer software that is distributed along with its source code. The code that is used to create the software via a special software license. The license allows users to use, change and improve the software's source code, and to redistribute the software either before or after it has been modified.
- Ø In my opinion, people prefer open source software over proprietary alternatives because open source model is often developed in collaboration with other contributors, which you can get access and shared intellectually.
- Ø (Open Office versus Microsoft Office)
- Open Office:
- - Linux kernel
- - Mozilla’s Firefox web browser
- - Eclipse software development platform
- - MySQL database system
- - GIMP image editing software
Proprietary software is an alternative to the commercial model of software, where u
need to pay for the software but you don’t get access to the source code
because it is considered someone else’s intellectual property.
Meanwhile,
open source software is a shared intellectual property among all who have
helped develop or modify it. The high quality that results because the source
code gets passed around, tested and modified to correct any bugs developers may
encounter.
2.
Discuss different types of threats and malicious program (malware) that can
damage a computer, mobile device or disrupt any system. Search for information
on current known malware program. Based on the information that you have found,
create a table to list different types of malware, what it does, and how it can
be repaired or removed. This information is useful for you to prevent any malware
from damage your computer system.
Threats
Computer systems are vulnerable to many
threats that can inflict various types of damage resulting in significant
losses. This damage can range from errors harming database integrity to fires
destroying entire computer centre. Losses can stem, for example, from the
actions of supposedly trusted employees defrauding a system, from outside
hackers, or from careless data entry clerks. Precision in estimating computer
security-related losses is not possible because many losses are never
discovered, and others are "swept under the carpet" to avoid unfavourable
publicity. The effects of various threats varies considerably: some affect the
confidentiality or integrity of data while others affect the availability of a
system.
Malware
Malware is a short form of malicious software
which used or programmed by attackers to disrupt a computer operation, gather
sensitive information, or to gain access to private computer systems. It can
appear in the form of code, scripts, active content, and other software.
Malware is a general term used to refer to a variety of forms of hostile or
intrusive software. Below are stated the types of malwares, their function and
prevention from them.
|
Types of Malware
|
What It Does
|
|
|
Computer Virus
|
A malware
when executed replicates by inserting copies of itself into other computer
programs, data files, or the boot sector of hard drive. Perform some type of
harmful activity on infected host.
|
Install an
antivirus that can detect and eliminate known viruses when computer attempts
to download or run an executable. Also operating system updated timely,
careful Internet browsing and installation of trusted software.
|
|
Ransomware
|
A malware,
known as crypto viral extortion, which restricts access to the computer
system that it infects, and demands a ransom to paid to the creator of the
malware in order for the restriction to be removed.
|
Keep all of
the software on your computer up to date. Keep your firewall turned on. Don't
open spam email messages or click links on suspicious websites.
|
|
Worms
|
A standalone
malware that replicates itself in order to spread to other computers. Often
uses a computer network to spread itself relying on security failures on the
target computer to access it and cause some harm to the network
|
Operating
system’s vendors will supply regular security updates. Users should be wary
of opening unexpected email, not run attached files or programs, or visit
suspicious web sites. Update regularly anti-virus or anti-spyware.
|
|
Trojan Horses
|
A hacking
program, non-self-replicating type of malware which gains privileged access
to the operating system while appearing to perform a desirable function but
instead drops a malicious payload, often including backdoor.
|
Never run an
executable file unless you are absolutely sure it comes from a trusted source.
Security patches should always be downloaded directly from a vendor's
website. Also, turn off computer when not used.
|
|
Root-kits
|
Stealthy malicious
software, designed to hide the existence of certain processes or programs
from normal methods of detection and enable continued privileged access to a
computer.
|
Apply
security patches, implementing the principle of least privilege, reducing the
attack surface and installing anti-virus software. Also routine monitoring is
required.
|
|
Spyware
|
Software
that aids in gathering information about a person or organization without
their knowledge and that may send such information to another entity without
the consumer’s consent.
|
Install an
anti-spyware program, which provide real-time protection, which scan all
incoming network data for spyware and block the threats if detected.
|
0 comments: