Sunteți pe pagina 1din 14

CYBERSPACE, TECHNOLOGY AND SOCIAL ISSUES

Solved Assignment Course Code: MIR-011

Part A

Write short notes on any four of the following:

1. System and Application software.

Answer: System software is a type of computer program that is designed to run a computer’s
hardware and application programs. If we think of the computer system as a layered model,
the system software is the interface between the hardware and user applications.

The operating system (OS) is the best-known example of system software. The OS manages
all the other programs in a computer.

The BIOS (basic input/output system) gets the computer system started after you turn it on
and manages the data flow between the operating system and attached devices such as
the hard disk, video adapter, keyboard, mouse, and printer.

The boot program loads the operating system into the computer's main memory or random
access memory (RAM).

An assembler takes basic computer instructions and converts them into a pattern of bits that
the computer's processor can use to perform its basic operations.

A device driver controls a particular type of device that is attached to your computer, such as a
keyboard or a mouse. The driver program converts the more general input/output instructions
of the operating system to messages that the device type can understand.

According to some definitions, system software also includes system utilities, such as the
disk defragmenter and System Restore, and development tools such
as compilers and debuggers.

System software and application programs are the two main types of computer software.
Unlike system software, an application program (often just called an application or app)
performs a particular function for the user. Examples (among many possibilities)
include browsers, email clients, word processors and spreadsheets.

Application software, or simply applications, are often called productivity programs or end-
user programs because they enable the user to complete tasks, such as creating documents,

1 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
spreadsheets, databases and publications, doing online research, sending email, designing
graphics, running businesses, and even playing games! Application software is specific to the
task it is designed for and can be as simple as a calculator application or as complex as a word
processing application. When you begin creating a document, the word processing software
has already set the margins, font style and size, and the line spacing for you. But you can
change these settings, and you have many more formatting options available. For example, the
word processor application makes it easy to add color, headings, and pictures or delete, copy,
move, and change the document's appearance to suit your needs.

The different types of application software include the following:

Application Software Type Examples

MS Word, WordPad and


Word processing software
Notepad

Database software Oracle, MS Access etc

Apple Numbers, Microsoft


Spreadsheet software
Excel

Multimedia software Real Player, Media Player

Microsoft Power Point,


Presentation Software
Keynotes

Customer relationship
Enterprise Software
management system

Documentation tools,
Information Worker Software
resource management tools

Dictionaries: Encarta,
BritannicaMathematical:
Educational Software
MATLABOthers: Google
Earth, NASA World Wind

Flight and scientific


Simulation Software
simulators

Accessing content through


Content Access Software
media players, web browsers

2 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
Application Software Type Examples

OpenOffice, Microsoft
Application Suites
Office

IDE or Integrated
Software for Engineering and Product Development
Development Environments

2. Emerging issues from Cyberspace.

Answer: A. Trends in Mobile Laws The increased usage of mobile devices, cell phones,
smart phones, personal digital assistants and all other kinds of communication devices in
different parts of the world are becoming an integral part of day –to-day existence in life. This
has widened the scope of Mobile Ecosystem and is likely to give rise to various complex legal
issues and challenges across the world in countries like India and China, wherein the usage of
mobile devices is exceedingly high, the area of mobile law is emerging and different
complicated legal, regulatory and policy challenges concerning the usage of mobile devices
and communication devices are coming to the forefront ,and it is expected that these countries
would contribute towards the growth and development of Mobile law

B. Social Media and Challenges One of the biggest problem cyber law is encountering is
related to development of jurisprudence relating to social networking. Increased adoption and
usage of social media are likely to bring various legal, policy and regulatory issues. Social
media crimes are increasingly gaining attention of relevant stake holders. Misuse of
information, other criminal and unwanted activities on social networking platforms and social
media are raising significant legal issues and challenges. There is a need for the countries
across the world to ensure that rule of law prevail on social media.

C. Cyber security and related issues with the growing activities of cyber crime across the
world, there is a need for enacting a appropriate legislative, regulatory and policy framework
pertaining to cyber security. The International Conference on Cyber law, Cyber crime and
Cyber security which took place in November 2014 in India highlighted significant issues
affecting cyber security and came up with various recommendations for international
stakeholders. It is likely that countries of the world have to deal with issues pertaining to
attacks and intrusions into computer systems and networks from location outside the territorial
boundaries of the country. It has the potential of prejudicially impacting the sovereignty,
integrity and security of the country. Thus there is a need for the nations across the world to
amend their existing IT legislations which would help the protection, preservation and
promotion of cyber security in the use of computers and communication devices.

3 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
D. Cloud Computing and Challenges Another important challenge in cyber space is the
evolution and development of legal responses to the complicated legal challenges poised and
raised by cloud computing and virtualization. Cloud computing being a popular phenomenon
among corporate is likely to bring forth issues like data protection and data confidentiality.
The relevant stakeholders including lawmakers and governments across the globe need to
provide appropriate legal, policy and regulatory framework pertaining to legal aspects
concerning cloud computing.

E. Spam Laws In the initial years, spam seemed to be targeted at computers but has now also
targeted mobile phones. Email spam is the most common form of spamming, Mobile phone
spam and instant messaging spam also exist. In majority of the countries there is no such anti
spam law, which has led to the further growth of spam. There is an increased need for the
countries to come up with regulatory and legal framework for spam as many countries have
already become hotspots for generating spam.

3. E-governance.

Answer: Definition: E-governance, expands to electronic governance, is the integration


of Information and Communication Technology (ICT) in all the processes, with the aim of
enhancing government ability to address the needs of the general public. The basic purpose of
e-governance is to simplify processes for all, i.e. government, citizens, businesses, etc. at
National, State and local levels.

In short, it is the use of electronic means, to promote good governance. It connotes the
implementation of information technology in the government processes and functions so as to
cause simple, moral, accountable and transparent governance. It entails the access and
delivery of government services, dissemination of information, communication in a quick and
efficient manner.

Benefits of E-governance

 Reduced corruption
 High transparency
 Increased convenience
 Growth in GDP
 Direct participation of constituents
 Reduction in overall cost.
 Expanded reach of government
Through e-governance, the government plans to raise the coverage and quality of
information and services provided to the general public, by the use of ICT in an easy,
4 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
economical and effective manner. The process is extremely complicated which requires, the
proper arrangement of hardware, software, networking and indeed re-engineering of all the
processes to facilitate better delivery of services.

Types of Interactions in E-Governance

1. G2G (Government to Government): When the exchange of information and services is


within the periphery of the government, is termed as G2G interaction. This can be both
horizontal, i.e. among various government entities and vertical, i.e. between national, state and
local government entities and within different levels of the entity.

2. G2C (Government to Citizen): The interaction amidst the government and general public
is G2C interaction. Here an interface is set up between government and citizens, which
enables citizens to get access to wide variety of public services. The citizens has the freedom
to share their views and grievances on government policies anytime, anywhere.

3. G2B (Government to Business): In this case, the e-governance helps the business class to
interact with the government seamlessly. It aims at eliminating red-tapism, saving time, cost
and establish transparency in the business environment, while interacting with government.

4. G2E (Government to Employees): The government of any country is the biggest


employer and so it also deals with employees on a regular basis, as other employers do. ICT
helps in making the interaction between government and employees fast and efficient, along
with raising their level of satisfaction by providing perquisites and add-on benefits.

E-governance can only be possible if the government is ready for it. It is not a one day task,
and so the government has to make plans and implement them before switching to it. Some of
the measures include Investment in telecommunication infrastructure, budget resources,
ensure security, monitor assessment, internet connectivity speed, promote awareness among
public regarding the importance, support from all government departments and so forth

E-governance has a great role to play, that improves and supports all tasks performed by
the government department andagencies, because it simplifies the task on the one hand and
increases the quality of work on the other.

4. Digital Divide.

Answer: The digital divide is a phenomenon wherein those who have access to ICT are
benefited by the use of it. Their economic well being is ensured in the form of highly paid jobs
and more business opportunities, while those who do not have the access to ICT remain aloof
of these benefits and hence comparatively they are in a disadvantageous position. The divide
does not affect only economically but socially as well. Hence the digital divide is the socio-
economic difference between peoples in their access to ICT. The term also refers to gaps
between groups in their ability to use ICTs due to varying literacy and technical skills, and the
gap in availability of quality, useful digital content. The divide is seen as a socioeconomic

5 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
problem.

There are many reasons which are responsible for the existence of the divide:
First is the non availability of a reliable ICT infrastructure to access the internet. The
ICT infrastructure of a country is determined through a number of measures like number
of PCs, tele-density etc. ICT is highly advanced technology and it is available with
select countries. Hence other countries have to import the necessary structure. There is
lack of resources to invest in information infrastructure, and research and development
in most of the developing countries.

Secondly there are problems in accessing the internet regularly. There is the problem of
connectivity i.e. availability of a fast, reliable and cost effective internet connection.
Then there is the cost of accessing the internet which includes telephone tariff and line
rental and cost of Internet Service Provider (ISP). To this may be added the replacement
cost of computer. Cost of Internet access may be prohibitive for many low-income
households. The quality of service provided by ISP is also important. Because of poor
quality of services available due to backward technology it becomes difficult to exploit
benefits of ICT.

Thirdly education is one of the major factors hampering diffusion of ICT amongst
masses. Only those who are not only literates but computer literates can really benefit
from ICT. In developing countries where Governments are still trying to universalize
elementary education computer literacy is a far cry. Hence the divide is bound to exist.

Fourth reason is the availability of relevant material in one’s own language. The most
important benefit of the internet is that it is the vast reservoir of knowledge & information.
However this knowledge should be comprehensible to those who actually require it i.e.
there must be availability of web content in the language of the user. Another challenge
for the user is to find the information. The absence of relevant content may act as a
barrier to Internet access.

Fifth is the digital capacity of the society i.e., e-readiness. E-readiness is the capacity of
the society to incorporate ICT in all its pursuits. The e-readiness of the society primarily
depends upon availability of skilled human resource that is capable of using, improving,
innovating and adapting the new technologies. The different segments of the society viz
the households, business, the government etc. should be willing to accept and absorb
ICT. The government must provide a regulatory framework by making necessary laws
& rules to govern the use of ICT in different sectors of the society. Lesser the readiness,
wider the divide and vice-versa.

6 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
Answers any four of the followings:

6. What is Convergence? Discuss the different aspects of VPNs?

Answer: Convergence is the priming of underlying digital technology components and


features such as voice, texts, video, pictures, broadcasts, presentation, streaming media, global
connectivity and personalized services; the combination of all of these features and abilities
from multiple electronic systems into a simplified, converged and computer-mediated
communication system to enable individuals interact, play, communicate, collaborate and
share information in many new and different ways.

A virtual private network (VPN) is a private data network that makes use of the
public telecommunication infrastructure, maintaining privacy through the use of a
tunneling protocol and security procedures.

Intranet VPNs
Intranets are defined here as semi-permanent WAN connections over a public
network to a branch office. These types of LAN-to-LAN connections are assumed
to carry the least security risk because corporations generally trust their branch
offices and view them as extensions of the corporate network.
In this case, the corporation generally controls both the source and destination nodes.
IS administrators should ask whether or not this assumption holds true for their
company.

Remote Access VPNs


In any remote access VPN scenario, usability is an important criterion. Most security
flaws are attributed to configuration errors, so the easier the system is to manage,
the less likely is the chance for oversight. On the client side, simplicity is critical
because many travelling employees and telecommuters either lack the technical
proficiency or the access to technical resources for troubleshooting. Clients should
not have to manually build a VPN tunnel, “manually” meaning having to launch VPN
software each time the user wants to establish a secure communication channel.
Instead, the VPN software should launch automatically at start-up and run
transparently in the background. On the server side, centralized and easy management
is essential because monitoring large numbers of users and adding and
removing users on a regular basis can quickly become chaotic and can create a
security risk.

Extranet VPNs
Unlike intranets that are relatively isolated, extranets are intended to reach
partners, customers, and suppliers, as well as remote employees. Securing that wide
area network requires diligence and the right tools. An extranet VPN needs to be
able to provide a hierarchy of security, with access to the most sensitive data being
nested under the tightest security control. It should secure all applications, including
TCP and UDP applications, such as Real Audio, FTP, etc.; corporate vertical

7 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
applications, such as SAP, BAAN, People Soft, Oracle, etc.; and “homegrown”
applications, such as Java, Active X, Visual Basic, etc. Because most corporate
computing environments are heterogeneous with many legacy systems, a sound
VPN solution should be extremely versatile and interoperable with multiple platforms,
protocols, and authentication and encryption methods.

7. Discuss the main components of the good security policy for protecting computer
system.

Answer: Policies form the basic framework of a security program. At the program level,
policies represent senior management’s security objectives. At the system level, they provide
rules for the construction and operation of specific systems. Whether program or system
specific, policies help prevent inconsistencies by forming the basis for detailed standards,
guidelines, and procedures. They also serve as tools to inform employees about appropriate
activities and restrictions required for regulatory compliance. Finally, policies make clear
management’s expectations of employee involvement in protecting information assets.

The characteristics of a good security policy are:

1) It must be implementable through system administration procedures, publishing of


acceptable use guidelines, or other appropriate methods.

2) It must be enforceable with security tools, where appropriate, and with


sanctions, where actual prevention is not technically feasible.

3) It must clearly define the areas of responsibility for the users, administrators, and
management.

The components of a good security policy include:

1) Computer Technology Purchasing Guidelines, which specify required, or preferred,


security features. These should supplement existing purchasing policies
and guidelines.

2) A Privacy Policy which defines reasonable expectations of privacy regarding such issues as
monitoring of electronic mail, logging of keystrokes, and access to users’ files.

3) An Access Policy, which defines access rights and privileges to protect assets from loss or
disclosure by specifying acceptable use guidelines for users, operations staff, and
management. It should provide guidelines for external connections, data communications,
connecting devices to a network, and adding new software to systems. It should also specify
any required notification messages (e.g., connect messages should provide warnings about
authorized usage and line monitoring, and not simply say “Welcome”).
8 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
4) An Accountability Policy, which defines the responsibilities of users, operations
staff, and management. It should specify an audit capability, and provide incidenthandling
guidelines (i.e., what to do and who to contact if a possible intrusion is detected).

5) An Authentication Policy which establishes trust through an effective password


policy, and by setting guidelines for remote location authentication and the use of
authentication devices (e.g., one-time passwords and the devices that
generate them).

6) An Availability statement.

9. What do you mean by Encryption? Describe RSA algorithm with examples.

Answer: Encryption is the process of using an algorithm to transform information to make it


unreadable for unauthorized users. This cryptographic method protects sensitive data such as
credit card numbers by encoding and transforming information into unreadable cipher text.
This encoded data may only be decrypted or made readable with a key. Symmetric-key and
asymmetric-key are the two primary types of encryption.

Encryption is essential for ensured and trusted delivery of sensitive information. Encryption is
also used to secure data sent over wireless networks and the Internet. For example, many Wi-
Fi networks are secured using WEP or the much stronger WPA encryption. You must enter a
password (and sometimes a username) connect to a secure Wi-Fi network, but once you are
connected, all the data sent between your device and the wireless router will be encrypted.

Many websites and other online services encrypt data transmissions using SSL. Any website
that begins with "https://," for example, uses the HTTPS protocol, which encrypts all data sent
between the web server and your browser. SFTP, which is a secure version of FTP, encrypts
all data transfers.

There are many different types of encryption algorithms, but some of the most common ones
include AES (Advanced Encryption Standard), DES (Data Encryption Standard), Blowfish,
RSA, and DSA (Digital Signature Algorithm). While most encryption methods are sufficient
for securing your personal data, if security is extremely important, it is best to use a modern
algorithm like AES with 256-bit encryption.

RSA Algorithm in Cryptography

RSA algorithm is asymmetric cryptography algorithm. Asymmetric actually means that it


works on two different keys i.e. Public Key and Private Key. As the name describes that the
Public Key is given to everyone and Private key is kept private.

9 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
An example of asymmetric cryptography :

1. A client (for example browser) sends its public key to the server and requests for some
data.
2. The server encrypts the data using client’s public key and sends the encrypted data.
3. Client receives this data and decrypts it.
Since this is asymmetric, nobody else except browser can decrypt the data even if a third party
has public key of browser.
The idea of RSA is based on the fact that it is difficult to factorize a large integer. The public
key consists of two numbers where one number is multiplication of two large prime numbers.
And private key is also derived from the same two prime numbers. So if somebody can
factorize the large number, the private key is compromised. Therefore encryption strength
totally lies on the key size and if we double or triple the key size, the strength of encryption
increases exponentially. RSA keys can be typically 1024 or 2048 bits long, but experts believe
that 1024 bit keys could be broken in the near future. But till now it seems to be an infeasible
task.
Let us learn the mechanism behind RSA algorithm :
>> Generating Public Key :
 Select two prime no's. Suppose P = 53 and Q = 59.
 Now First part of the Public key : n = P*Q = 3127.

 We also need a small exponent say e :


 But e Must be

 An integer.

 Not be a factor of n.

 1 < e < Φ(n) [Φ(n) is discussed below],
 Let us now consider it to be equal to 3.

 Our Public Key is made of n and e

Now we are ready with our – Public Key ( n = 3127 and e = 3) and Private Key(d = 2011)
Now we will encrypt “HI” :
 Convert letters to numbers : H = 8 and I = 9

 Thus Encrypted Data c = 89e mod n.


 Thus our Encrypted Data comes out to be 1394

10 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
Now we will decrypt 1394 :

 Decrypted Data = cd mod n.


 Thus our Encrypted Data comes out to be 89

8 = H and I = 9 i.e. "HI".

10. Differentiate between open source software and the proprietary software.

Answer: Open source software (OSS) refers to the software which uses the code freely
available on the Internet. The code can be copied, modified or deleted by other users and
organizations. As the software is open to the public, the result is that it constantly updates,
improves and expands as more people can work on its improvement.

proprietary software is opposite to OSS and means the software which uses the proprietary
and closely guarded code. Only the original authors of software can access, copy, and alter
that software. In case with proprietary software, you are not purchasing the software, but
only pay to use it.

For better understanding the peculiarities of open source software and proprietary software,
I have made a comparison of five basic aspects: pricing, security, support, source availability,
and usability.

#1 Price Policy

Open source often referred as a free of cost software. It can, however, have costs for extras
like assistance, additional services or added functionality. Thus, you may still pay for a service
with OSS.

proprietary software is usually a paid software. The costs can vary depending on the
complexity of the software. While the price can be higher, what you get is a better product,
full support, functionality and innovation. However, most companies provide free trials to
convince the purchaser that their software is the right fit.

#2 Security

The question of security is very controversial as each software has two sides of the coin. The
code of open source software can be viewed, shared and modified by community, which
means anyone can fix, upgrade and test the broken code. The bugs are fixed quickly, and the
code is checked thoroughly after each release. However, because of availability, the source
code is open for hackers to practice on.

11 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
On the contrary, proprietary software can be fixed only by a vendor. If something goes
wrong with the software, you send a request and wait for the answer from the support team.
Solving the problem can take much longer than compared to OSC.

When it comes to choosing the most secure software, the answer is that each of them has its
pros and cons. Thus, it is often a challenge for firms which work in particular industry.

#3 Quality of Support

Comparing open source and proprietary software support, it is obvious that proprietary
software is predominant in this case. The costs for it include an option to contact support and
get it in one business day in most cases. The response is well organized and documented.

For open source software such option is not provided. The only support options are forums,
useful articles and hired expert. However, it is not surprising that using such kind of service
you will not receive a high level of response.

#4 Source Code Availability

Open source software provides an ability to change the source code without any restrictions.
Individual users can develop what they want and get benefits from innovation developed by
others within the user community. As the source code is easily accessible, it enables the
software developers to improve the already existing programs.

proprietary software is more restricted than open source software because the source code
cannot be changed or viewed. However, such limitation is what may contribute to CSS
security and reliability.

#5 Usability

Usability is a painful subject of open source software. User guides are written for developers
rather than to layperson users. Also, these manuals are failing to conform to the standards and
structure.

For proprietary software usability is one of the merits. Documentation is usually well-
written and contains detailed instructions.

Best Examples of OSS and proprietary software carts

The market is full of open source and closed source shopping carts. The basic difference lies
in the price. Open source shopping cart systems are free, whereas for closed source programs
you will have to pay. With payment you get customer support and confidence. Because open
source shopping carts are free, they don’t have such option. However, their community on
different forums is very active and always ready to help.

12 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19
The benefits of open source solutions are primarily flexibility and scalability. You have full
control over every aspect of your site’s design, thanks to the open source code. When your
business expands, and your monthly sales increase, you can embrace it without being charged
more for increased sales volume.

proprietary software is easier to work with for beginners or those who don’t know how to
code. Also, closed source websites are easier and faster to set up out of the box.

The top open source shopping carts are Magento and OpenCart, and
BigCommerce and Shopifyare popular proprietary software source platforms.

Closing remarks

Each of the platform types has its own philosophy, methodology, advantages and
disadvantages. There is no univocal option as it depends on business needs. We hope this
article will come in handy for you to make the right choice for your business.

13 For more Solved Assignment Visit: www.jobaffairs4u.in © All rights reserved 2017-19

S-ar putea să vă placă și