RIPHAH INTERNATIONAL UNIVERSITY
ASSIGNMENT SUBMITTED BY ; AF-18-JL-0059
1.
SUBMITTED TO ; ASIM MANSHA
Categories of Computer
Computer can be classified into 4 different classes. Which are, Supercomputers A supercomputer is pretty much exactly what it sounds like. It’s a term used to describe computers that have the most capable processing power of its time. Early supercomputers in the 60s and 70s used just a couple processors, while the 90s saw supercomputers with thousands of processors at a time. Today, modern supercomputers run hundreds of thousands of processors, capable of computing quadrillions of calculations in just a few nanoseconds. You probably won’t be needing that kind of power to access Facebook… Actually, supercomputers are used in computational science to calculate and carry out a plethora of complex tasks.
Mainframe Computers Like supercomputers, mainframe computers are huge, towering machines with lots of processing power. Mainframe computers are mostly used by corporations, government agencies, and banks – organizations that need a way to store large quantities of information
Minicomputers A minicomputer is a multiprocessing machine that can support up to about 200 users at the same time. It’s like a less powerful mainframe computer, and is about the size of a refrigerator. A server can be an example of a minicomputer, but not all servers are minicomputers.
Microcomputers Microcomputers are the ones people are most familiar with on a daily, nonprofessional basis, but of course that doesn’t mean they’re exclusive to the home. Microcomputers are smaller computers that run on microprocessors in their central processing units. They are much, much cheaper than supercomputers, mainframe computers and even minicomputers, because they’re meant for everyday uses that are more practical than professional
2.
Computers in Society
Computers are, perhaps, the best invention by man so far. To understand their impact on society, we will first have to understand their meaning. A computer does not necessarily mean a monitor, keyboard, mouse, and a CPU. It is any machine or device that can compute and execute instructions given to it in the form of programs. So technically, even a cell phone is a computer. And so are desktops, laptops, tablet PCs, and PDAs. It includes anything that can perform a series of operations on its own. This gives us an idea as to how wide and deep its role is in our lives. We need this device for virtually everything
One of the most important advantages of this machine is in the field of science for research and development. It has played a major role in most of what we know about ourselves and the universe. The satellites, the telescopes, and almost all the research tools use it in some or the other way. The huge calculations required for space science, safe communication between scientists, storage of all the gathered information, etc., are some of its uses in science and technology.
Where there are advantages there are also disadvantage and misuse of computers. This is only the tip of the iceberg, as we can't even imagine the ubiquity of computers in today's life. However, this technology has also given rise to many vices, like identity theft, hacking, etc. One needs to use it only for a good purpose, and not misuse it. But the truth remains the same - the advantages supersede their disadvantages with pride.
3.
Protect privacy in cyber space
Cyber or Internet privacy involves the right or mandate of personal privacy concerning the storing, repurposing, provision to third parties, and displaying information pertaining to oneself via of the Internet. data privacy. Privacy concerns have been articulated from the beginnings of largescale computer sharing.
Privacy can entail either Personally Identifying Information (PII) or non-PII information such as a site visitor's behavior on a website. PII refers to any information that can be used to identify an individual. For example, age and physical address alone could identify who an individual is without explicitly disclosing their name, as these two factors are unique enough to identify a specific person typically.
4.
Countering cyber crime
Cyber crime or Computer crime, refers to any crime that involves a computer and a network. Netcrime refers, more precisely, to criminal exploitation of the Internet. hacking, copyright infringement, identity theft, child pornography, and child grooming. There are also problems of privacy when confidentialinformation is lost or intercepted, lawfully or otherwise.
On the global level, both governments and non-state actors continue to grow in importance, with the ability to engage in such activities as espionage, and other cross-border attacks sometimes referred to as cyber warfare. The international legal system is attempting to hold actors accountable for their actions, with the International Criminal Court among the few addressing this threat.[3] A cyber countermeasure is defined as an action, process, technology, device, or system that serves to prevent or mitigate the effects of a cyber attack against a victim, computer, server, network or associated device. A number of countermeasures exist that can be effectively implemented in order to combat cyber-crime and increase security
Government
Federal Trade Commission (FTC) Federal Bureau of Investigation (FBI) Bureau of Alcohol Tobacco and Firearms (ATF) Federal Communications Commission (FCC)
Private organizations
Antivirus/Security Firms Internet Service Providers (ISPs) Messaging Anti-Abuse Working Group (MAAWG) IT Consultants Computer Security Incident Response Team (CSIRT)
Public–private partnerships
Computer emergency response team (CERT), Carnegie Mellon University United States Computer Emergency Readiness Team (US-CERT)