0% found this document useful (0 votes)
22 views4 pages

Assignment 1

write purposel title for accounting

Uploaded by

narrycjga
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
0% found this document useful (0 votes)
22 views4 pages

Assignment 1

write purposel title for accounting

Uploaded by

narrycjga
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1/ 4

School of Infomatics

Department of Computer Science


Computer Security Course

Assignment -1 (Individual Assignment)

Name : NEBIYU TEKLE

ID : cs/we/133/12

Section : 2

1|Page
1. What is cyber security ?
 Cyber security refers to the practiceof protecting computer
systems,damage,networks and data from unauthorized access,theft,
or disruption.
 It involves implementing measures to prevent, detect, and respond to
various thrats,including cyberattacks,data breaches, and other forms
of malicious activities.

The Different Types of Cybersecurity


 Network Security
 Cloud Security
 Endpoint Security
 Mobile Security
 IoT Security
 Application Security
 Zero Trust

2. Briefly explain the element of computer security that


modern IT or computer science professionals need to
know?
 modern IT or computer science professionals need to be familiar with
several key elements of computer security. These include:

a) Authentication and Access Control:

This involves verifying the identity of users and granting them


appropriate levels of access to computer systems and resources.

b) Encryption:
Encryption is the process of converting data into a form that can
only be read or understood by authorized parties.
It helps protect sensitive information from unauthorized access.

2|Page
c) Firewalls and Network Security :

Firewalls are neteork security devices that monitor and control


incoming and outgoing network traffic.
They help protect network from unauthorized access and malicious
activities.

d) Malware Protection :
Malware refers to malicious software such as viruses, worms, and
ransomware.
IT professionals need to understand how to implement and maintain
effective malware protection measures to prevent infection and
mitigate risks.

e) Incident Response and Disaster Recovery :

Professionale should have knowledge of incident response


procedures to quickly identify, analyze, and respond to security
incidents.
Additionally they need to understand disaster recovery processes to
ensure business continuity breach or other catastrophic evente.

f) Security Auditing and Compliance :


IT professionals should Be familiar with security auditing practices
and compliance requirements to assess the effectiveness of security
controls and ensure adherence to relevant reguiations and
standards.

3. Computer security vulnerabilities :

are weaknesses or flaws in computer systems or networks that can be exploited


by attackers to gain unauthorized access, disrupt services, steal information, or
cause other forms of harm. Common vulnerabilities include software bugs,
misconfigurations, weak passwords, and social engineering techniques.

3|Page
Countermeasures refer to preventive measures or actions taken to address these
vulnerabilities and mitigate the associated risks. Some common
countermeasures include:

a) Regular software updates and patches: Keeping software systems up to date


with the latest security patches helps address known vulnerabilities.

b) Strong authentication: Implementing mechanisms such as multi-factor


authentication can strengthen the authentication process and make it harder for
attackers to gain unauthorized access.

c) Encryption: Encrypting sensitive data both at rest and during transmission


helps protect it from unauthorized access.

d) Intrusion Detection and Prevention Systems (IDPS): IDPS tools monitor


network traffic and systems for suspicious activities or known attack patterns,
helping to detect and prevent attacks.

e) User education and awareness: Training users to recognize and avoid


common security threats, such as phishing emails and suspicious downloads,
can significantly reduce the risk of successful attacks.

f) Regular backups and disaster recovery planning: Performing regular


backups of critical data and having a well-defined disaster recovery plan can
help recover from security incidents or data loss.

These are just a few examples, and effective cybersecurity involves a multi-
layered and holistic approach, combining various technical and non-technical
measures to address vulnerabilities and protect computer systems and data.

4|Page

You might also like