ECommerce Assignment
ECommerce Assignment
Page 1
INSTITUTE OF BUSINESS MANAGEMENT
QUESTION NO 1:
Define the following terms:
a) Hacker
b) Virus
c) Jammer
d) Spoofer
e) Sniffing
f) Malicious software
ANSWER NO 1
Hacker
Hacker is a term used by some to mean "a clever programmer" and by others, especially those in
popular media, to mean "someone who tries to break into computer systems."
Virus
A program or piece of code that is loaded onto your computer without your knowledge and runs against
your wishes. Viruses can also replicate themselves. All computer viruses are manmade. A simple virus
that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus
is dangerous because it will quickly use all available memory and bring the system to a halt. An even
more dangerous type of virus is one capable of transmitting itself across networks and bypassing security
systems.
Jammer
In cell phone terminology, a jammer is a device that blocks transmissions by creating interference. The
jammer emits signals in the same frequency range that cell phones uses, and within the range of a
jammer a cell phone user may lose their signal. In satellite terminology it is a mobile ultrahigh-frequency
(UHF) high-power noise source that can be used to jam satellite antennas or receivers.
Spoofer
Similar to a hacker, but the things a spoofer does are completely legal and don't harm anything in any
way. Usually appear in online game lobbies on systems that run on separate software, like battle.net
Sniffing
A program or device that captures vital information from the network traffic specific to a particular
network.
Malicious software
Malicious software (malware) is any software that gives partial to full control of your computer to do
whatever the malware creator wants. Malware can be a virus, worm, trojan, adware, spyware, root kit,
etc. The damage done can vary from something slight as changing the author's name on a document to
Page 2
INSTITUTE OF BUSINESS MANAGEMENT
full control of your machine without your ability to easily find out. Most malware requires the user to
initiate it's operation. Some vectors of attack include attachments in e-mails, browsing a malicious
website that installs software after the user clicks ok on a pop-up, and from vulnerabilities in the
operating system or programs. Malware is not limited to one operating system.
Malware types can be categorized as follows: viruses, worms, trojans, and backdoors seek to infect and
spread themselves to create more havoc. Adware and spyware seek to embed themselves to watch
what the user does and act upon that data. Root kits seek to give full access of your machine to the
attacker to do what they want.
QUESTION NO 2
ANSWER NO 2
DESCRIPTION SPYWARE ADWARE
Installation Stage Adware will clearly show its Spyware will not show its
presence during the presence during the
installation stage. installation stage.
Page 3
INSTITUTE OF BUSINESS MANAGEMENT
QUESTION NO 3
ANSWER NO 3
DEFINITION:
A firewall is a set of related programs, located at a network gateway server, that protects the resources
of a private network from users from other networks. An enterprise with an intranet that allows its
workers access to the wider Internet installs a firewall to prevent outsiders from accessing its own
private data resources and for controlling what outside resources its own users have access to.
Basically, a firewall, working closely with a router program, examines each network packet to determine
whether to forward it toward its destination. A
firewall also includes or works with a proxy
server that makes network requests on behalf of
workstation users. A firewall is often installed in
a specially designated computer separate from
the rest of the network so that no incoming
request can get directly at private network
resources.
Page 4
INSTITUTE OF BUSINESS MANAGEMENT
A number of companies make firewall products. Features include logging and reporting, automatic
alarms at given thresholds of attack, and a graphical user interface for controlling the firewall.
Computer security borrows this term from firefighting, where it originated. In firefighting, a firewall is a
barrier established to prevent the spread of fire.
a) Packet filters: Looks at each packet entering or leaving the network and accepts or rejects it based
on user- defined rules. Packet filtering is fairly effective and transparent to users, but it is difficult to
configure. In addition, it is susceptible to IP spoofing.
b) Application gateway: Applies security mechanisms to specific applications, such as FTP and
Telnet servers.
d) Proxy server: Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.
e) Function: A firewall's function within a network is similar to physical firewalls with fire doors in
building construction. In the former case, it is used to prevent network intrusion to the private
network. In the latter case, it is intended to contain and delay structural fire from spreading to
adjacent structures.
f) Network layer and packet filters: Network layer firewalls, also called packet filters, operate at a
relatively low level of the TCP/IP protocol stack, not allowing packets to pass through the firewall
unless they match the established rule set. The firewall administrator may define the rules; or
default rules may apply
Page 5
INSTITUTE OF BUSINESS MANAGEMENT
Standalone Hardware Firewalls are typically administered by a direct serial typically a connection
between the firewall and a simple text - based terminal computer. Hardware firewalls can be great for
large networks, they may not be practical when only a few computers need to be secured.
Software Based Firewalls: Software based firewalls perform the same functions as hardware –
based firewalls. But instead of working as standalone devices on the network, they run on computers
connected to the network. Norton Personal Firewall, BlackIce, Zonealarm are the few examples of
Software Firewall.
Page 6
INSTITUTE OF BUSINESS MANAGEMENT
Page 7