+1 (218) 451-4151
glass
pen
clip
papers
heaphones

Q-1Â Spoofing is the form of hacking. Today there are many examples of Spoofing happening, that we may…

Q-1Â Spoofing is the form of hacking. Today there are many examples of Spoofing happening, that we may…

Q-1 Spoofing is the form of hacking. Today there are many examples of Spoofing happening, that we may have fallen into the trap of. Most people now have Caller ID, now there are programs that make fake ID’s to show when that hackers calls your line. This makes you unable to know who is really calling you. Spoofing also can come through in the form of a text message. Most people think that their text messages are private, but they really are not (Moes, 2018). You could give all your information to the hacker by receiving a text.Story of a Victim- that their Bank details has been stolen  I was the victim of a ‘spoof’ email, allegedly from PayPal. The email was on PayPal stationery and asked me to update my account information. I did so, giving out all my credit card information.The next day, I received a legitimate email from PayPal, indicating that my screen name had been changed (googlesites, 2017). I was dumbfounded and called immediately to inquire about the change.  They gave me a purely idiotic Yahoo screen name and informed me that I had been ‘spoofed.’I sweated out the night and went to my bank first thing the next morning to cancel my account and open a new one. When I got home, I called my credit card company, and numerous charges had been made THAT DAY on the card.  I explained my situation, and they agreed to cancel that account and issue me a new card.  Thankfully I was not liable for those charges!It’s too easy for hackers to get private and confidential information on the Internet.  But – the hackers are smarter than we are.Answer:I want 150 words explanation on this paragraph with reference, you sentence must have to start from, I like your post, I want to add some more details on your discussion.  Q-2 The core piece of software which is described as life of computer system and where the application runs is called Operating System or Kernel. This is an integral part of network servers, desktops, mobile devices, which makes the system controllable, operational and manageable of all the applications and programs. The security of an operating system has an essential impact on the whole computer system as it plays an important role in every computer systems operation. The continuous running of multiple applications on a single operating system software use same resources as CPU, I/O devices, memory and disk. All these components of computer are controlled by the operating system. Security of operating systems include maintenance of confidentiality, availability and system integrity. To make the environment stable, to provide control access to resources and to give external control access to the environment, securing of operating system is necessary. Maintaining physical security of the system, providing security to the information the system holds and securing the network in which it operates are the major kinds of security provided to operating system. In conclusion, the security of operating system plays major role for securing all multiple applications and programs as technology evolves.Answer:I want 150 words explanation on this paragraph with reference, you sentence must have to start from, I like your post, I want to add some more details on your discussion.