Computer Security and Internet PDF
Document Details
Uploaded by Deleted User
Tags
Summary
This document appears to be lecture notes or study material. It covers various topics related to computer security and internet concepts. The document includes different sections (groups) on topics and objectives for each one.
Full Transcript
GROUPINGS Group 1 TOPIC Objectives 7. The Internet and World Wide Web 7.1. Computer Communications and Network Identify and describe various broadband Internet connections. Atillo (laptop) 7.2 T...
GROUPINGS Group 1 TOPIC Objectives 7. The Internet and World Wide Web 7.1. Computer Communications and Network Identify and describe various broadband Internet connections. Atillo (laptop) 7.2 The Internet Explain how computer communicate to each other in details. 7.3 The World Wide Web Describe how computer server and client works 7.3 Other Internet Services Describe the types of Internet access providers: Internet service providers, online service providers, and wireless Internet service Baclayon (laptop) providers. Explain how to access the World Wide Web indetail, from the backend to the frontend Academia Describe the type of Websites Recognize how Web pages use graphics, animation, audio, video, virtual reality, and plug-ins. Adlawon Sanchez Group 2 TOPIC Objectives 8. Computer Security and Safety Lecera 8.1 Computer Security Risks Describe various types of Internet and network attacks and 8.2 Internet and Network Attacks identify ways to safeguard against these attacks, including 8.3 Health Concerns of Computer Use firewalls and intrusion detection software. Discuss ways to prevent health-related disorders and injuries Bucio (laptop) due to computer use. Cite at least 5 real-life problem that has caused many problems or threat to the society and discuss how important it is to pay Bustamante (laptop) attention to these attacks. Discuss issues surrounding information privacy, including electronic profiles, cookies, spyware and adware, spam, phishing, privacy laws, social engineering, employee monitoring, and Bonite content filtering. Moreno Group 3 TOPIC Objectives Describe and differentite the scenario of how each of the attack is Butal (laptop) being done or manifested and demonstrate (if possible) the Malware Attacks interventions, precautions you can do to protect your Viruses computer/gadget. Worms Coquilla (laptop) Trojans Whaling Denial-of-Service (DoS) and Distributed Concon Denial-of-Service (DDoS) Attacks DoS Attack DDoS Attack Man-in-the-Middle (MitM) Attacks Dalion SQL Injection Cross-Site Scripting (XSS) Credential Stuffing Quir (laptop) Group 4 TOPIC Objectives Describe and differentite the scenario of how each of the attack is Esmaya (laptop) being done or manifested and demonstrate (if possible) the Ransomware interventions, precautions you can do to protect your Phishing Attacks computer/gadget. Email Phishing Gansan (laptop) Spear Phishing Social Engineering Pretexting Degamo Baiting Tailgating Insider Threats Durango Ad Fraud DNS Spoofing Rogue Software Villabeto (laptop) Group 5 TOPIC Objectives 9.1 What is Enterprise Computing? Discuss the special information requirements of an enterprise- Gruta (laptop) 9.2 Information Systems in the Enterprise sized organization. 9.3 Virtualization and Cloud Computing Identify information systems and software used in the functional Lacang (laptop) units of an enterprise. Describe and list general purpose and integrated information Makinano systems used throughout an enterprise in details. Describe virtualization, cloud computing, and grid computing. GIve real-life examples for each subtopic and how important it is Guibao in the economic growth in the IT industry. Bactol Group 6 TOPIC Objectives Legada (laptop) 9.4 E-Commerce Identify the types of E-Commerce Business-to-Consumer (B2C) Identify each E-ecommerce Key Feature Business-to-Business (B2B) Give example for each per e-commerce and where does it Makiling (laptop) Consumer-to-Consumer (C2C) usually apply in the real-world scenario. Consumer-to-Business (C2B) Determine why computer backup is important and how it is Business-to-Government (B2G) accomplished. Mernilo (laptop) Government-to-Business (G2B) Government-to-Consumer (G2C) Mobile Commerce (m-commerce) 9.5 Back-up Procedures Labastida Escanilla