At Westonci.ca, we connect you with experts who provide detailed answers to your most pressing questions. Start exploring now! Our platform provides a seamless experience for finding reliable answers from a knowledgeable network of professionals. Get immediate and reliable solutions to your questions from a community of experienced professionals on our platform.

1. What is meant by data losing its value?

2. Explain what is meant by an automatic backup

3. Explain how phishing and pharming trick a user into giving up personal data

4. Explain how anti-virus software may help to prevent distributed denial of service attacks

5. Explain why computer security is more effective when anti-virus software end firewalls are used

6. Describe how a proxy server can help keep data safe

7. Explain the difference between symmetric and asymmetric encryption

8. Describe what a protocol is and how protocols help protect data


Sagot :

Explanation:

1.Data loss occurs when valuable or sensitive information on a computer is compromised due to theft, human error, viruses, malware, or power failure. It may also occur due to physical damage or mechanical failure or equipment of an edifice.

2.Automatic backup is a type of data backup model that requires little or no human intervention in backing up and storing data from a local network/system to a backup facility. Automating the backup process saves time and complexity required to manually back up a computer, network or IT environment.

3.A phishing attack is basically social engineering and identity theft that generally targets users with the aim to con them into revealing their personal and confidential information. In this technique, hackers send spoofed emails in the name of a legitimate source to victims and trick them into clicking on a malicious link or attachment to acquire their personal information. 

In many instances, these phishing scams use software or security vulnerabilities to install malicious software in the targeted user’s device. In any case, the human factor remains the key element in the successful phishing attempts of these cyber crooks. 

4.Equip your network, applications, and infrastructure with multi-level protection strategies. This may include prevention management systems that combine firewalls, VPN, anti-spam, content filtering and other security layers to monitor activities and identity traffic inconsistencies that may be symptoms of DDoS attacks.

5.While antivirus software helps to protect the file system against unwanted programs, a firewall helps to keep attackers or external threats from getting access to your system in the first place. Other threats travel from computer to computer without the knowledge of the user.

6.Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests. A good proxy server keeps users and the internal network protected from the bad stuff that lives out in the wild internet.

7. The basic difference between these two types of encryption is that symmetric encryption uses one key for both encryption and decryption, and the asymmetric encryption uses public key for encryption and a private key for decryption.

8. A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. Essentially, it allows connected devices to communicate with each other, regardless of any differences in their internal processes, structure or design.

MARK ME BRAINLIEST!!!PLSSSSS

Thank you for visiting our platform. We hope you found the answers you were looking for. Come back anytime you need more information. We hope our answers were useful. Return anytime for more information and answers to any other questions you have. Westonci.ca is here to provide the answers you seek. Return often for more expert solutions.