Anda di halaman 1dari 2

TEJ2O1: Networking

Name: Nathan Aular


/25
Security Worksheet







1. Which is more valuable, a computer or the data it contains? Explain your
answer. (3 marks)
The data is more valuable because in some cases, there can be private
financial information on the computer that can be endangered if someone
were to have access to that information. Also the physical computer can be
replaced if it is damaged, but the data on a computer cannot be replaced.

2. Describe some potential issues if an organization such as a business or
school, were to have its network hacked. (3 marks)
If an organization such as a school or business were to have its network it
can endanger the entire network and the hacker could possibly have access
to all the information of the network, such as financial information, internet
usage, etc.

3. In your own words explain what a virus is. (2 marks)
A virus is a piece of coding that can replicate itself and potentially harm your
computer.

4. List some ways a virus can be spread. (2 marks)

a. They can be transmitted as e-mail attachments
b. They can attach themselves to program file

5. Match the following: (3 marks)













Worms
Trojan
Spyware
This keeps track of web pages that you look at
and then sends the data to a third party
This is a type of virus that replicates itself
within a system so many times it simply clogs
up the system resources
This virus is called this because it is disguised
as a file a user would be tempted to open e.g. a
game or graphics file

TEJ2O1: Networking

6. What is the role of a Firewall? (2 marks)
The role of a firewall is to help protect a network from threats that might try
to break in and gain access to the computer and its data. The firewall also
filters the information coming through the internet connection into your
personal computer.

7. Find an article on the Internet on the effects of hacking (to individuals or
business) OR ethical use of computers. Summarize it in 100 words or less
below. (Also attach the original article - You can either print it out or provide the
link to it.) (10 marks)

Computer hacking can effect businesses in a number of ways. One of the
best examples of this would be the financial information of a business. If a
hacker were to gain access to the financial information of a business then it
could potentially harm the business. Also hackers could also have access to
the information of employees and clients such as, their e-mail, addresses
and even their identities. A perfect real-life example of this would be when
SONY was hacked in 2011. This cost SONY more than $170,000 just to
recover from being hacked. Not only can hackers harm businesses but they
can also harm individuals, for example if a hacker were to gain access to
someones personal information such as their, financial information, identity,
and address.

Anda mungkin juga menyukai