Group Project Assignment a. (1). Search the Web for the term “advanced persisten
ID: 3715932 • Letter: G
Question
Group Project Assignment a. (1). Search the Web for the term “advanced persistent threat” (APT) attack and defense. What is the significance of APT in comparison with other types of cybersecurity attacks? Review
https://www.itbusinessedge.com/slideshows/the-most-famous-advanced-persistent-threats-in-history-24.html
(24 slides). Classify these APT attacks by: methods they used (virus, worm, SQL injection, etc.) and purpose (collect or damage information). What methods of APT attacks are used most frequently. ? b. (2). Search the Web for the term biometric authentication. Describe and compare four methods of biometric authentication, that you would recommend for Biometric ATM bank machines. ? c. (3) Search the Web for the term “Green Computing.” Describe Green Computing factors and technology. Explain how Green Computing can increase profit for corporations. ?
Explanation / Answer
1. APT stands for advanced persistent threat .it is a kind of network attack . in which an third party called as unauthorised user gain access to our device and monitor all the activites happening in it .and users such as sender or receiver will not be able to detect him at all .APT's is different from other cyber security attacks as most of them tend to change data ordestroy data but here ,APT's major purpose/ aim is to steal system's data rather than destroying it .these attacks are mostly on big companies , government data .
methods used for APTcan be
2 b.>
Authentication is a process used to increase the security of the system .process of identifying individual's identity which is entering into network based on username or password .password is proof of right identity and authorization is process of giving indvidual access to the system objects based on their identity . but passwords can be broke and security can be affected so new technique is BIOMETRIC AUTHENTICATION it relies on the unique biological characteristics of a person .it always compare data which is already present in its database .in this unique characteristics of users body is checked , then helps in logging in a service, an app, a device and so on.
methods of biometric authentication are:
for example
Aadhar card used in india uses this technique when they are made a uinque aadhar number is given to each individual and its rectina , finger prints, thumb prints are recorded so whenever they use any service and log in using adhar card the chances of false user / hacker entering into system reducess to nill because .entry will only be provided to right authorised user .hence it provides high security .
if ATM uses finger print of individual to provide its services it will eradicate problem of stealing money using clone atm cards ,frauds will not be possible . and security of whole system will be at its peak
c>
we need to save powers, gain long term profit, we need good power management hence increasing performance of devices for that green computing is used . means ,practice which helps us to achieve all factors listed above .
this consist of 4 parts
use of it resources is increasing day by day so this problem can be solved by making eco friendly hardware devices & components, using unique and new techniques which helps in energy saving , to design software set of practices which can support the critical problems .
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.