Computer Related Paraghaps
Computer Related Paraghaps
Computer Related Paraghaps
Computer
A computer is one of the best man-made creations that has been developed to help
people in various sectors. It has become such an important part of our lives that we
find computers everywhere we go. Starting from our school life till our old age, we
have many uses for computers. We have been so much dependent on computers that
we are using computers for almost everything we do. It is a device that can store an
enormous amount of data in it. We are so much dependent on computers that we do
not want to put any pressure on ourselves. We blindly store all our data in a computer
with a safety passcode. A computer takes up the responsibility and processes the
output in no time, hence making our life easier. It collects the data, processes it, and
then provides the final result to us within a very short time. People in this day and
age have become so reliant on computers that they cannot imagine life without them.
Computers are significant because of their widespread use, productivity, and
openness. Computers are the most needed innovation due to their incredible benefits.
Computers are used in every field like the education sector, hospitals, hotels, etc. If
you go for a CT scan, X-ray, or an ECG, you will need a computer to check your
body. In case you want to submit a project, you will need a computer. It has become
a part of our lifestyle. The computer is a remarkable piece of science that man has
created to help humanity. Computers are in charge of today’s reality, and they have
unquestionably altered people’s lifestyles and the condition of developing countries.
Computer Science
Computer science, is the study of computers and computing, including their
theoretical and algorithmic foundations, hardware and software, and their uses for
processing information. The discipline of computer science includes the study
of algorithms and data structures, computer and network design, modeling data
and information processes, and artificial intelligence. Computer science draws
some of its foundations from mathematics and engineering and therefore
incorporates techniques from areas such as queueing theory, probability and
statistics, and electronic circuit design. Computer science also makes heavy use
of hypothesis testing and experimentation during the conceptualization, design,
measurement, and refinement of new algorithms, information structures, and
computer architectures. Computer science is considered as part of a family of five
separate yet interrelated disciplines: computer engineering, computer
science, information systems, information technology, and software engineering.
This family has come to be known collectively as the discipline of computing. These
five disciplines are interrelated in the sense that computing is their object of study,
but they are separate since each has its research perspective and curricular focus.
(Since 1991 the Association for Computing Machinery [ACM], the IEEE Computer
Society [IEEE-CS], and the Association for Information Systems [AIS]
have collaborated to develop and update the taxonomy of these five interrelated
disciplines and the guidelines that educational institutions worldwide use for their
undergraduate, graduate, and research programs). The major subfields of
computer science include the traditional study of computer
architecture, programming languages, and software development. However, they
also include computational science (the use of algorithmic techniques for modeling
scientific data), graphics and visualization, human-computer
interaction, databases and information systems, networks, and the social and
professional issues that are unique to the practice of computer science. As may be
evident, some of these subfields overlap in their activities with other modern fields,
such as bioinformatics and computational chemistry. These overlaps are
the consequence of a tendency among computer scientists to recognize and act
upon their field’s many interdisciplinary connections.
Cyber Security
Cyber Security is the practice of identifying the vulnerabilities and threats
associated with digital systems and mitigating these risks. The term “cyber” refers
to a nickname for an internet-connected computer or any other device that uses a
processor, input/output, and networking connections. The common threats
include viruses, worms, trojans, and malware. A related term is a cyber warfare
which is the use of cyber tools in warfare to achieve objectives that would not be
possible by using physical means such as bombs or missiles. Cyber security has
always been an important issue but it became prominent when major events
happened such as the 2015 Bangladesh bank robbery where hackers stole $81
million from the bank’s central account at its headquarters in Bangladesh. The role
of cyber security professionals is to protect critical systems and information. The
main goal of cyber security is to prevent hackers from gaining access to information
or using nefarious actions that would put the users’ information at risk.
Cyber security is important because the government, military, law enforcement,
and private industry use many critical resources that could be negatively affected
by cyber-attacks. Many of these systems are financial, such as banks, credit cards,
ATMs, stock markets, and networks. Government agencies use software to manage
the US budget system and the military uses software to track troop movement.
Because of these vital uses, cyber-attacks could cripple important services or even
destroy the country’s financial security.
For companies to operate securely in today’s technological world, they need to
implement cyber security protections. These protections include firewall
protection, anti-virus programs, and encryption codes that keep hackers from
easily accessing sensitive data and data backup systems in case any security breach
occurs that causes damage to systems or information.
Cyber security is of increasing concern for businesses, governments, and
individuals. Despite the many controls and systems in place, there are still many
cyber-attacks that occur. Some of the most recent high-profile attacks include The
Target data breach, the Heartbleed bug, the WannaCry attack, and the Bangladesh
bank robbery. These events exposed customers’ personal information which can
be used by hackers and targeted for identity theft or as part of a fraudulent scheme.
A major concern to cyber security is providing more efficient support to better
protect against cyber-related activities. This means an organization must have the
information available to help identify possible threats including understanding
what possible methods hackers may use to gain access, and how the organization
can prepare for any potential attacks.
Cyber security is a constantly growing area of study and research. Some of the most
recent research being done is focused on cyber security in cyberspace. The purpose
of this paper will be to analyze if a previous study found in 2012 correctly identified
computers within an organization as well as their movement throughout the
network. Two main findings are sought out which were: 1) how computers move
across networks (e.g., LAN, WAN, etc.), and 2) how computers might behave in a
network. The assumption is that computers within an organization move between
locations (e.g., building or branch offices) and they may change their location(s).
Also, the behavior of a computer can be tracked as observed (e.g., its IP address
changes from one to another, or its Whole information changes from one domain
name service provider to another).
Many networks have become globalized today using the internet as the primary
means of communication with many different locations and companies around the
world. A new report published by Gartner Inc. named the number of organizations
that use geographic information systems (GIS) for cyber security has risen
dramatically to two-thirds. The other third is using other technologies, including
intrusion detection systems (IDS), firewalls, and antivirus software.
No information security agency is perfect. Most infosec practitioners in the world
today agree that no agency can completely protect their organization from all
possible threats. However, the best agencies should have a variety of defense
techniques that can work together as an effective strategy to secure the
organization from malicious activities.
Server hardening is one of these techniques that could work effectively when it
comes to cyber security and computer network defense. This practice is used to
strengthen the security of a system. Preventing harm from malicious hacking or
other types of attacks can be a challenge in today’s digital world. This is why
security professionals should implement good practices and standards for cyber-
hardening their systems.
Server hardening is one important way to protect against attacks that could result
in damage to an organization’s data, infrastructure, and strategies for meeting
business goals. Server hardening is also known as application whitelisting and uses
special techniques to add controls on the operating system (OS) that are not related
directly to the applications installed on the server. It’s important to stress that
server hardening is an asset-focused process. It’s not just a checklist of steps that
one can blindly follow. It requires the information security expert to identify the
required baseline configuration and then fine-tune it according to the information
gathered during asset review or from other sources.
Cybercrime and protecting systems against attacks are both increasing in the world
today. Cyber security is a topic of major concern among the government and
private sector. As technology advances, it becomes easier for hackers to exploit
vulnerabilities in operating systems, applications, and hardware. Attackers have no
problem taking advantage of these vulnerabilities and using them to their
advantage. A cyber-attack can be interpreted as an offense or a defense depending
on how it is used by the attacker. An attacker may use a cyber-attack offensively to
create chaos and disrupt services during peacetime or defensively to prepare for
an offensive attack during wartime.
Children are being targeted more and more by cybercriminals. Cybercriminals use
legitimate-looking email accounts and social media such as Facebook, Twitter, or
Instagram, to target children with malicious links or attachments in an attempt to
gain access to their network. These criminals may also use the same account and
then message the child about their personal life which leads to a breach of trust.
Once the attacker has proven that he is legitimate he may ask for the child’s home
address, birthday, and other personal information. The reason for this is so they
can send a birthday gift (which is malware) and/or other gifts which will lead to
more trust (this may be delivered via snail mail).
Every individual today has the opportunity to benefit from technology. This is an
advantage for people, but it also opens organizations up to new risks which may be
exploited by cybercriminals. Since a majority of the population uses computer
technology directly or indirectly in daily life.
Cyber security offers a variety of career paths depending on the level of experience
you have and your area of expertise. You can be an analyst/engineer, network
administrator, programmer, or data analyst, and many more other positions
available depending on your area of interest and experience. Some jobs a required
while others are possible as long as it relates to your field in the security field such
as computer science or finance. If you’re looking for a career that will pay well, then
cyber security is the right choice for you because it’s relatively new and will only
continue to grow.
Operating System
An Operating System (OS) is an interface between a computer user and computer
hardware. An operating system is a software that performs all the basic tasks like
file management, memory management, process management, handling input and
output, and controlling peripheral devices such as disk drives and printers. Some
popular Operating Systems include Linux Operating System, Windows Operating
System, VMS, OS/400, AIX, z/OS, etc. An operating system is a program that acts as
an interface between the user and the computer hardware and controls the
execution of all kinds of programs. Following are some of the important functions
of an operating system: memory Management, processor Management, device
management, file management, security, control over system performance, job
accounting, error detecting aids, etc. Memory management refers to the
management of Primary Memory or Main Memory. Main memory is a large array
of words or bytes where each word or byte has its address. Main memory provides
fast storage that can be accessed directly by the CPU. For a program to be executed,
it must be in the main memory. An Operating System does the following activities
for memory management: 1. keeps track of primary memory, i.e., what parts of it
is in use by whom, and what part are not in use, 2. In multiprogramming, the OS
decides which process will get memory when and how much, 3. Allocates the
memory when a process requests it to do so, 4. De-allocates the memory when a
process no longer needs it or has been terminated, etc. In a multiprogramming
environment, the OS decides which process gets the processor when and for how
much time. This function is called process scheduling. An Operating System does
the following activities for processor management: Keeps track of the processor
and the status of the process. The program responsible for this task is known as the
traffic controller, which allocates the processor (CPU) to a process and De-allocates
the processor when a process is no longer required. An Operating System manages
device communication via their respective drivers. It does the following activities
for device management: keeps track of all devices. The program responsible for this
task is known as the I/O controller which decides which process gets the device
when and for how much time, and efficiently allocates the device and de-allocates
devices. A file system is normally organized into directories for easy navigation and
usage. These directories may contain files and other directions. An Operating
System keeps track of information, location, uses status, etc. The collective facilities
are often known as a file systems. It decides who gets the resources and allocates
the resources and also de-allocates the resources. Some of the important activities
that an Operating System performs are security, control over system performance,
job accounting, error detecting aids, coordination between other software and
users, etc.