please read below student posts and reply each in 125 words.Please check the names to differentiate the posts.
Ajay – Malware is mainly computer software or a program, which is designed to damage the computer system without the interference of the users. The criminal entities are majorly creating this malware; the main reason behind using this malware is to steal confidential data and information from a large organisation or a government entity. In recent year, the hackers are able to create different types of malware for example, worms, viruses, Trojan horses, key loggers, spyware and others (Wibowo & Ali, 2016). Additionally, every time a malware attacks the computer system, it is quite impossible and difficult to resolve the issue.
In many ways a malware attacks a computer system, moreover, this malware is not responsible for creating single damage. In recent years, organisations are implementing various methods to deal with malware attacks. In an organisation, every time a noxious program attacks, the information technology department remakes the entire host approach, however, this process is not always effective (Li et al,. 2018). Moreover, the prime flaw in this approach is, it does not make the organisation aware of the future threats.
The organisation first needs to enable a full assurance security system, which helps to create protection against every web-based attack, vulnerabilities, suspicious files and their behaviours, mutating malware and others. It is always the best option to resist the malware than fighting them and to do this, and the systems need to follow some rules in order to avoid malware attacks. The organisation needs to update the system’s antivirus on a regular basis, and for any new computer installing the latest version is safest. In many cases, due to the old versions of the malware attack systems. The management body needs to restrict the network usage of the employees; further checking on their software is also essential (Brundage et al,. 2018). Further, restricting the web-browser can also be helpful for mitigating malware threat on a machine.
priyanka – The three different terms web 2.0, social networking and mashup are intertwined with the new internet era, this is so-called as online world second phase evolution. Web 2.0 is raised to provide with the thinking changes about how applications should be developed in the future. Even the web 2.0 existence in the internet these applications were already in used for software blocking. There are many applications and services with web 2.0 influences, google AdSense, RSS web feeds, Wikipedia and there are thousands of mashups which are in existence.
Mashup is related to the web-based application which combines the functionality and content from different sources which are utilizing the technologies RSS and AJAX (Lu, P. C., 2008). Mashups doesnâ€™t require any programming language, so everyone can adapt this concept.
Social Networking is more popular in Myspace.com, which is an online community and utilized between the user and marketers.
Web 2.0 has got lot of changes to the new internet era and became the catch phrase for describing the websites with the static information broadcasting. In the world of web 2.0, web servers are used as platform for all people to create and share the content of their own from the online web blogs, photos or videos. RSS is incorporated by many websites which provides with the news headlines interestâ€™s summary. By utilizing this platform as user-friendly, people can visit them often, can post or review the comment. Popular social networking sites, video sharing sites, are taken up and employed by the web 2.0 technologies to adopt their technology advantages by utilizing the internet without any attacks and security concerns. Hence web 2.0 technologies brought counter measures to avoid possible threats which were caused.
Babi – Remote Backups
Remote means to control something from a different location. Remote backup is one offsite backup whose function is in which one can use, start restoring or start the reserves while situated at your origin station. Remote backups come in different varieties like: â€œsubscription backup services provided by commercial data centres and backup to an offsite FTP serverâ€ (WANG & SONG 2018). Remote backups protect data from natural calamities such as earthquakes as compared to local backups. It eases administration as it is not necessary for one to move to the sever. However, remote backups are more costly compared to local backups. The reserve canâ€™t be used for emergency purposes as it takes time to back up or restore data.
The type of backup that is done through the File Transfer Protocol (FTP) on a network connection to an FTP server. The commercial data centre houses the server stationed separately from the original data in the process of being backed up. A form of â€œFTPâ€ maybe like: â€œonce you have organized an FTP server that you can use, you need to install a backup software utility that supports the FTP backup. You would need to specify the web address of your FTP server (like ftp://ftp-backup/), your login username and password so the backup utility can execute the backupâ€ (Courtes, Hamouda, Kaaniche, Killijian & Powell 2017). The offsite backup being of FTP makes it efficient in the protection of data from natural calamities. FTP also provides room for the data to be readily available to the user.
The name cloud identifies the backup storing facility gotten via the network connection. Cloud back up backs up data to a facility networked to the primary origin via a network connection. It can be used on different devices in a network connection between them, with all proper login details.
Babi – One of the most important things is to learn the usefulness and importance of the backup systems thus appreciating each and every backup strategy for its capabilities to perform its respective function.it is quite evident that the primary role of backups strategies is to safely store date from corruption, theft or even loss from deletion by mistake or natural calamities. Backups prove to be of more use to its users as compared to its disadvantages that can be coped up with such patience in waiting for data to restore or upload the backup.
When backing up data, we create a copy of the original data to be produced at the moment of loss of the original data. This clarifies that such copies could be made in significant numbers, thus ensuring maximum insurance of the data being stored and protected. With devices that are internet-enabled, even with the occurrence of a natural disaster, one can be able to access the backed up data and restore it back. This phenomenon makes backs up strategies very unique and useful as they are a variety hence provide different options of backing up, thus reliable to users.
For successful results, backups are regularly updated to ensure maximum assurance of protection of the data been kept safe. Data backups are the best solution to problems that come with data loss, data corruption, interference by viruses or malware interference. Such problems often occur on a frequent basis to individuals who handle data; hence the use of backup strategies eases the tension of occurrence of such risks and also come along with its remedies.
Mounika – Practising the security measures from day one would be better to protect a system. The issues may be severe if it is not maintained correctly. Such as loss of data or information may be a considerable loss to any individual. Various regular practices that an individual need to follow to protect the system are as follows:
Make sure the device is connected to only the authorized networks that are provided by the organization. Try not to connect USB, Pendrive, and other devices that are affected by the malware. If in case it is an emergency or compulsory to connect devices to the system, verify if the tools are free from malware. Operating system hardware should be strong enough to withstand the malware attacks.
There are new viruses that are developed daily to access distinct persons’ confidential information. So try to have an antivirus application on the system such that it would take care of the viruses on the network. Set the antivirus application such as you to get regular updates of antivirus applications and update regularly. Be careful when you are accessing the websites. Verify the website address correctly and only then access to those websites.
Whenever you access the emails, try to read very carefully and then answer the emails. Do not reply unnecessarily to the mails as they may confirm the email address and then send many exciting offers to attract the individuals. Ensure to have strong passwords for security purposes. Set the passwords such that no one would easily access the files or the information. Have a password which is a composition of different characters and don’t share it with the others (Amro, 2017).
divya – Web 2.0 has benefits that helps the organizations where individuals can be able to create their own blogs and act as host in various platforms. The main feature that attracts the users is the concept that has combinations in the technologies where customers has ability to interact with information. The one such example is Facebook where millions of users can interact and exchange data. Every technology will have its pros and cons and in web 2.0 the critical part to discuss is privacy and security. There are many security concerns with web 2.0 applications and below are a few privacy and security concerns.
Â· The applications of web 2.0 has ability to demand the products of governments and organizations making them transparent.
Â· Web 2.0 has open nature that challenges with the enterprise approach to mitigate properties that is sharing the information.
Â· In the blogs and wikis, there will be risk of losing the information that is shared by the users where some will happen without their knowledge. The poor-quality nature of web 2.0 has this concern which is not so authorized and prone to malicious activities.
Â· The freedom of information legalities is the main challenge in web 2.0 for any organization as it has open access in sharing the data.