Subject:
Computer ScienceAuthor:
everettsimonCreated:
1 year agoAnswer:
i) A threat, in the context of computer security,
refers to anything that has the potential to
cause serious harm to a computer system.
A threat is something that may or may not
happen, but has the potential to cause serious
ii)• Trojan horses: A Trojan horse is simply a computer program. The program claims to do one thing (it
may claim to be a game) but instead does damage when you run it (it may erase your hard disk).
Trojan horses have no way to replicate automatically.
• Worms: A worm is a small piece of software that uses computer networks and security holes to
replicate itself. A copy of the worm scans the network for another machine that has a specific security
hole. It copies itself to the new machine using the security hole, and then starts replicating from there,
as well.
iii) A firewall is a system designed to prevent unauthorized access to or from a private network. Firewalls
can be implemented in both hardware and software, or a combination of both. All messages entering
or leaving the intranet pass through the firewall, which examines each message and blocks those that
do not meet the specified security criteria.
iv) -
1. You shall not use a computer to harm other people.
2. You shall not interfere with other people's computer work
v) 1. A white hat hacker breaks security for non-malicious reasons, perhaps to test their own
security system
2. A "black hat" hacker is a hacker who "violates computer security for little reason beyond
maliciousness or for personal gain"
3. A grey hat hacker lies between a black hat and a white hat hacker. A grey hat hacker may surf
the Internet and hack into a computer system for the sole purpose of notifying the administrator
that their system has a security defect,
4. A social status among hackers, elite is used to describe the most skilled.
5. A blue hat hacker is someone outside computer security consulting firms who is used to bug-
test a system prior to its launch, looking for exploits so they can be closed
vi) Backup and Restore (formerly Windows Backup and Restore Center) is a component of Microsoft
Windows introduced in Windows Vista and included in later versions that allows users to create
backups and restore from backups
vii) File backups are saved to ZIP files. Two methods of file backup are supported: The first,
normal backup, stores everything selected for backup. The second, incremental backup stores
only files that are changed after a previous backup.
viii) System image: The image-based full system backup option, called Complete PC Backup in
Windows Vista or system image in Windows 7, allows for the imaging of the entire system
including operating system and data volumes. The backed up image can later be restored
through the Windows Recovery Environment either to the same computer or to a new
computer of different brand and type
Explanation:
please mark as brainliest
Author:
schotziekrause
Rate an answer:
13Answer:
Author:
micah
Rate an answer:
10