SECURITY PRACTICES ANSWER
SECURITY PRACTICES ANSWER
The forward function in the network layer is responsible for transmitting data packets
from a source to a destination across multiple networks. It involves looking up routing
tables, selecting the best path, and forwarding packets accordingly. This function
ensures efficient delivery using protocols like IP (Internet Protocol), OSPF (Open
Shortest Path First), RIP (Routing Information Protocol), and BGP (Border Gateway
Protocol). It also handles fragmentation, addressing, and error handling during
transmission. Routers play a crucial role in forwarding packets by analyzing
destination IP addresses and making routing decisions. Proper implementation of
the forwarding function improves network efficiency and reduces congestion.
1. Install Security Software – Use antivirus, anti-malware, and firewalls, and keep
them updated.
2. Apply Updates and Patches – Regularly update the OS, software, and drivers to
fix vulnerabilities.
3. Enforce Access Control – Implement strong authentication and restrict user
permissions.
4. Enable Firewalls – Configure host-based firewalls to filter network traffic.
5. Use Encryption – Protect sensitive data and communications with encryption.
6. Monitor Logs – Use intrusion detection systems (IDS) to detect suspicious
activity.
7. Perform Backups – Regularly back up critical data to prevent loss.
8. Disable Unused Services – Reduce attack surfaces by turning off unnecessary
features.
9. Implement Security Policies – Enforce password rules, access controls, and
session limits.
10. Train Users – Educate employees on cyber threats and safe practices.
Internet Security
Internet security is a broad term that refers to a wide range of tactics that aim to
protect activities conducted over the internet. Implementing internet security measures
helps protect users from different online threats like types of malware, phishing attacks,
scams, and even unauthorized access by hackers. .
Why is internet security so important today?
As the internet expands and becomes an even bigger part of our lives, cyberthreats
continue to grow both in scope and sophistication. According to Forbes, data breaches and
cyberattacks saw an increase of 15.1% in 2021 compared to the previous year. These
security threats come in different forms and vary in terms of complexity and detectability.
Some common online threats people face today include:
Malware: Malicious software is an umbrella term that refers to any program that
exploits system vulnerabilities to damage a computer system or network and steal
sensitive information from users. Examples of malware include viruses, Trojans,
ransomware, spyware, and worms.
Phishing: Phishing is cyberattacks that involve stealing a user’s sensitive data by duping
them into opening an email or an instant message and clicking a malicious link . The data
that cybercriminals target can range from login credentials to credit card numbers.
Phishing attacks are often used for identity theft purposes.
Spam: Spam is a term that describes unwanted email messages sent in bulk to your
email inbox. This tactic is generally used to promote goods and services users aren’t
interested in. Spam mail can also contain links to malicious websites that automatically
install harmful programs that help hackers gain access to your data.
Botnets: This contraction of “robot network ” refers to a network of
computers that have been infected with malware. The computers are then
prompted to perform several automated tasks without permission.
Examples of these tasks include sending spam and carrying out denial-ofservice
(DDoS) attacks.
Wi-Fi threats: Wi-Fi networks can be subject to a wide range of attacks that involve
hackers exploiting unprotected connections and breaching data security to obtain sensitive
information. .
Antivirus protection
The first step in making sure you have internet security is installing antivirus software.
These programs are designed to prevent, search for, detect, and get rid of viruses and other
types of malicious software.
Antivirus software can run automatic scans to make sure no network or data breach has
occurred and scan specific fies or directories for any malicious activity or patterns.
There are plenty of options to choose from when it comes to antivirus
software, however, few programs offer the comprehensive level of protection
the antivirus software included in McAfee® Total Protection provides to its
users.
McAfee’s antivirus software comes with a wide selection of features,
including malware detection, quarantine, and removal, different options for
scanning files and applications, and an advanced firewall for home network
security.
Create strong passwords
While this may sound obvious, it’s important to create strong and unique passwords for all
your online accounts and devices. A significant percentage of data breaches occur as a
result of simple password guessing.
Some tips to follow when creating a password include:
Never use personal information, such as date of birth.
Don’t reuse passwords.
Avoid sequential numbers or letters.
Combine letters, numbers, and symbols.
Don’t use common words.
It can also be a good idea to use a password manager , as this will help reduce the riskof
your passwords getting leaked or lost. McAfee’s password manager, is
particularlyconvenient thanks to its advanced encryption and multi-factor authentication.
Check that your computer fierewall is enabled
A firewal l is a network security system built into your operating system. It
monitorsincoming and outgoing network traffic to prevent unauthorized access to
yournetwork. For it to be able to identify and block these threats, you’ll want to make
sureyour firewall is enabled on your device. If you’re unsure if your device comes witha
firewall, you can benefit from one included in McAfee Total Protection.
Use multi-factor authentication when possible
Multi-factor authentication (MFA) is an authentication method that requires at least two
pieces of evidence before granting access to an app or website. Using this method as much
as possible can add another layer of security to your applications and reduce the likelihood
of a data breach.
Choose a safe web browser
Your choice of browser is an important part of implementing internet security
measures. In fact, web browsers vary widely in terms of the security features that they
offer, with some offering just the basics and others providing a more complete range of
features. Ideally, you should opt for a web browser that offers the following security
features
Private session browsing
Pop-up blocking
Privacy features
Anti-phishing filter
Automatic blocking of reported malicious sites
Cross-site script filtering
How can you keep children safe online?
As children grow older, their internet use becomes more extensive. This can also increase
their exposure to various security threats. To keep them safe online, educate them about
the risks associated with web browsing and introduce them to some of the best practices
for avoiding online threats like not sharing passwords .Explain which information should
be shared and which information should be kept private and instruct them to never click on
links from unknown sources.You should also take a more active approach to protect your
children by setting parental controls on certain websites. For instance, you can use
YouTube’s parental controls to fiter any inappropriate content and keep a child-friendly
interface.
Internet security tips to know
The following tips can help you stay on the safe side in regard to internet security
Install antivirus software on all your devices. This is the first step you
should take when securing your mobile and computer systems. Internet
security software identifies vulnerabilities and can neutralize threats before
they become a bigger problem.
Keep your operating system and programs up to date. Neglecting to
update your applications and operating systems can leave you exposed to
threats as hackers seek to exploit unpatched vulnerabilities.
Use strong passwords. Using strong passwords reduces the risk of
a hacker cracking it and gaining access to your system.
Use an ad blocker. Adware pop-ups often trick users into clicking on links
that lead to malicious websites. Using an ad-blocker to help prevent this
from happening.
Use parental controls. Setting parental controls makes web browsing
safer for children and reduces the chances of virus infection.
Only shop on secure websites with “ https://” URLs. The “S” at the
end of the HTTP extension stands for “secure” and indicates that the
website has a security certificate and is safe for transactions.
Never submit financial information when using public Wi-
Fi. Public Wi-Fi hot spots lack security measures and encryption, making
them vulnerable to prying eyes. Sharing sensitive information like bank card
numbers when connected to one isn’t recommended.
Use multifactor authentication. As we mentioned, MFA adds a layer of
protection to the sign-in process and makes unauthorized access to your
data extremely diffiicult.
Check your bank statements regularly to catch any suspicious
activity. Keep an eye for any transaction that you don’t recall initiating, as
this could be a sign of a malware infection.
1. Viruses
Definition:
A virus is a type of malware that attaches itself to a legitimate program or file and spreads
when the infected program is executed.
Infection Mechanism:
Examples:
Definition:
Infection Mechanism:
Examples:
Definition:
A Trojan is malware disguised as legitimate software but contains a hidden payload that
executes malicious actions.
Infection Mechanism:
Examples
Emotet – Initially a banking Trojan, later evolved into a malware delivery tool.
4. Ransomware
Definition:
Ransomware is malware that encrypts files or locks systems and demands a ransom for
decryption.
Infection Mechanism:
Examples:
5. Spyware
Definition:
Infection Mechanism:
Examples:
6. Adware
Definition:
Infection Mechanism:
Installed unknowingly alongside other programs.
Displays intrusive ads, slows down devices, and tracks browsing habits.
Examples:
7. Rootkits
Definition:
A rootkit is malware that hides its presence and grants attackers privileged access to a
system.
Infection Mechanism:
Examples:
8. Botnets
Definition:
Infection Mechanism:
Devices are infected via malware, making them part of the botnet.
Examples:
Mirai Botnet (2016) – Used IoT devices to launch massive DDoS attacks.
9. Fileless Malware
Definition:
Fileless malware operates in memory without writing files to disk, making detection
difficult.
Infection Mechanism:
Examples:
Definition:
A logic bomb is malware triggered by specific conditions (e.g., date, time, user action).
Infection Mechanism:
Examples:
CIH (Chernobyl Virus) – Triggered on April 26, 1999, and wiped hard drives.
11. Cryptojacking
Definition:
Cryptojacking is malware that secretly mines cryptocurrency using a victim’s resources.
Infection Mechanism:
Examples:
Use Strong Security Software – Install antivirus and endpoint detection solutions.
Conclusion
Malware infections continue to evolve, leveraging new techniques to evade detection and
cause damage. Understanding the various types of malware and implementing robust
cybersecurity practices is crucial for minimizing risks and protecting digital assets.
9.Evaluate and contrast the merits and demerit of online identity and user
management system
Online identity and user management systems are essential for securing digital interactions,
managing user access, and enabling authentication and authorization. These systems
streamline security, improve user convenience, and support compliance but also pose risks
and challenges. Below is a detailed evaluation of their merits and demerits, along with a
comparison.
Example: A corporate employee uses Microsoft Azure Active Directory to securely access
email, cloud storage, and HR tools with a single login.
✅ Seamless Authentication: Users can log in once and access multiple platforms without
repeated authentication.
✅ Self-Service Features: Password recovery, profile updates, and account settings can be
managed by users without IT support.
✅ Personalization: User preferences and settings are stored securely, allowing
personalized services.
Example: Google and Facebook login options allow users to access third-party
applications without creating new credentials
Example: A company using AWS IAM (Identity and Access Management) can automate
user roles and track changes for compliance.
Example: OAuth 2.0 and OpenID Connect allow users to authenticate across multiple
services, such as logging into LinkedIn via a Google account.
❌ Single Point of Failure (SPoF): If an SSO system is compromised, all linked accounts
could be accessed by attackers.
❌ Phishing and Credential Theft: Users can be tricked into providing login details on
fake authentication pages.
❌ Data Breaches & Identity Theft: Centralized identity databases are prime targets for
cyberattacks.
Example: The 2019 Facebook breach exposed personal data of 530 million users due to
weak identity protection measures.
❌ Loss of Control: Companies relying on external identity providers (e.g., Okta, Google)
are at risk if the service goes down or policy changes.
❌ Vendor Lock-in: Switching from one identity provider to another can be costly and
complex.
❌ Privacy Violations: Some providers may track user data for targeted advertising or
surveillance.
Example: If a user loses access to their Google account, they might also be locked out of
third-party applications that use Google authentication.
❌ User Friction: MFA and additional security layers can frustrate users if not
implemented smoothly.
❌ Downtime Issues: If the identity provider experiences downtime, users cannot access
critical applications.
❌ Cross-Platform Compatibility: Some identity solutions may not work seamlessly
across different devices and platforms.
Example: If Microsoft Azure Active Directory goes down, employees cannot log into
Office 365, leading to lost productivity.
Implementation & Reduces IT workload by High initial setup costs, and requires
Cost centralizing access management continuous maintenance
Aspect Merits Demerits
Online identity and user management systems play a vital role in modern security
architecture, offering a balance between security, user experience, and scalability.
However, organizations must carefully address security risks, compliance, and usability
challenges.
✔ Adopt a Zero Trust Model – Continuously verify user identities and device security.
✔ Use Multi-Factor Authentication (MFA) – Balance security and convenience.
✔ Implement Decentralized Identity Solutions – Reduce reliance on centralized
providers.
✔ Regular Security Audits & Compliance Checks – Prevent unauthorized access and
ensure adherence to regulations.
✔ Educate Users on Phishing & Identity Theft – Reduce the risk of credential-based
attacks.