Type of service: Writing from scratch
Work type: Coursework
Deadline: 28 Oct, 4:29 PM
|Subject or discipline:||IT, Web|
|Title:||Information System Security|
|Number of sources:||1|
|Provide digital sources used:||No|
|# of pages:||1|
|# of words:||275|
|# of slides:||ppt icon 0|
|# of charts:||0|
Paper details:Please answer the questions that I attached perfectly, and response for the student answer that I also attached.
Note: I attached eBook, please try to match the answer with it
Information System Security
Information System Security Assignment
Privacy-invasive software (PIS)
These are computer software, which ignores the privacy of the user. Commercial intentions are the reasons behind distributing the programs. PIS secretly collects privacy-invasive information, present unwelcomed contents or secretly exchange requested contents with some other information. PIS sneak into the system and hide inside the core beyond access by the user.
The typical example of PIS is adware, which displays or downloads unwanted ads whenever the user is online. This behavior is malicious, as the program does not request the user’s consent.
Stagonatography, according to Whitman, M. E., & Mattord, H. J. (2011), is the practice of concealing a message, video, image, or a file within another a message, video, image, or file. Its importance to information security professional is that steganography helps to hide the message within a digital encoding of a graphic or picture to provide confidentiality. For example, in image storage, a pixel with a red intensity of 0101001 and another of 00101000 have no difference to the necked eyes. However, a steganographer uses the small distinction to achieve one bit per color to encode data into an image file.
Virus, worm and Trojan Horse.
According to the student’s answer, the only general similarity among the three is that all of them are malicious programs able to damage a computer. However, worm is a virus that can travel without human action and can replicate itself, unlike virus and Trojan. They breach security of the system by acting on private files without the user knowledge although virus, unlike Trojan spreads only when the user acts upon them.
Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Cengage Learning.