Tutorial 2

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6

Complete your list of news stories from https://www.theregister.co.uk/security/.

Make sure you have at


least 10.

1. https://www.theregister.co.uk/2019/01/31/north_korea_joanap_botnet_fbi_war
rant/
2. https://www.theregister.co.uk/2019/01/30/us_election_meddling/
3. https://www.theregister.co.uk/2019/01/31/texas_lawyer_sues_apple_eavesdro
pping_facetime_bug/
4. https://www.theregister.co.uk/2019/02/01/project_alias/
5. https://www.theregister.co.uk/2019/01/29/mozilla_anti_tracking_policy/
6. https://www.theregister.co.uk/2019/01/25/enisa_steve_purser_interview/
7. https://www.theregister.co.uk/2019/02/01/apple_facebook_google_enterprise_
cert_drama/
8. https://www.theregister.co.uk/2019/01/31/iran_embassies_malware/
9. https://www.theregister.co.uk/2019/01/31/systemd_exploit/
10. https://www.theregister.co.uk/2019/01/29/facetime_bug/

Compare lists with the person next to you. If they found an interesting story you haven't, add it to your
list.

1. https://www.theregister.co.uk/2019/01/24/hadoop_malware_attack/
2. https://www.theregister.co.uk/2019/01/25/data_hackers_ninjas/
Develop your own flowchart of how do you know if a story about a threat is important enough to you.
What are your criteria? Is it just keywords? Once you are done spend a few minutes to convince the
person next to you that your criteria are correct.
Develop your own flowchart of how do you know how long it will take you to understand all technical
terms mentioned in the stories. Where would the answers come from? How would you decide if
something is worth knowing now, within a week, or doesn't really matter if you know it? (Hint: think of
the previous flowchart of whether something is important to you.)
Your name: Kaijin Lee
Your student id: 17131818

Tick which unit this portfolio entry applies to:

[ X ] Unit 1 – What is Computer Security? [ ] Unit 4 – What do Computer Security threats


attack?
[ ] Unit 2 – Who needs to be protected from
Computer Security? [ ] Unit 5 – How can we protect ourselves from
Computer Security threats?
[ ] Unit 3 – Where do Computer Security
threats come from? [ ] Unit 6 – How can we prevent Computer
Security threats?

A) What is the relationship of what you learned in this Computer Security Unit to
other areas of Computer Science? How do other areas of Computer Science help with
what you learned in this Computer Security Unit?

From what I have learnt so far, it has been a very insightful experience to which I have gained a
lot of knowledge from. The relationship between Computer Security Unit and Computer Science
is that both require critical thinking and need to be done in care. The area which I have learnt
from Computer Science, which is understanding the features of how program works help me to
understand Computer Security Unit in a positive way.

B) How does what you learnt in this unit affect an individual’s life? How does it affect
someone’s working life? How does it affect an organisation?

It affects an individual’s life and working life in a way where it prevents and increases people’s
awareness. It alarms people to be more careful in different areas such as being aware of
downloading certain objects from the internet could cause lethal damage towards the computer.
Furthermore, it affects organisation because people work under it, if they are not aware of the
situation they are in, it would cause damage towards the organisation.
C) How would you convince a company that it would benefit from knowing more about
what we covered in this Unit? List your arguments.

● Increases awareness
● Avoid being in dire situation
● Able to increase security on PC
● Secure the company’s infrastructure is everyone’s job

D) What products / tools / technologies / processes / information sources have you


found, outside what is in the notes, which are relevant to this Unit? (How many should
you find? No fewer than 5, no more than 10.)

For each, provide your own description (in your own words) of what it is and how it can help
an individual or a company, and provide a reference to where someone can find more
information about it.

● NStealth: Hidden Benefits https://www.nstalker.com/products/editions/free/

It checks vulnerabilities by understanding and determining living hosts and services that
they run.

● Qualys: Cloud Tool for Securing Devices and Web Apps https://www.qualys.com/

It secures applications and devices through Cloud. Qualys will not only identify malware
and it also provide steps to keep data protected.

● Zscaler: Direct to Cloud Network https://www.zscaler.com/

It monitors specific local networks.

● Gnu PG: Guarding Your Privacy https://www.gnupg.org/

This is a tool used for email and file encryption. It features key management system,
together with access modules for different kind of key directories.

● McAfee https://www.mcafee.com/en-us/index.html
Help company businesses to control cyber environments. It protects, detects and corrects
the security threats.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy