Podcast
Questions and Answers
What is the primary purpose of computer security?
What is the primary purpose of computer security?
Which aspect of computer security guarantees that information is only modified by authorized individuals?
Which aspect of computer security guarantees that information is only modified by authorized individuals?
What term describes a weakness in a security system that could be exploited?
What term describes a weakness in a security system that could be exploited?
What is a common example of a denial-of-service attack?
What is a common example of a denial-of-service attack?
Signup and view all the answers
Which situation describes a threat to a computer system?
Which situation describes a threat to a computer system?
Signup and view all the answers
What is meant by the term 'availability' in the context of computer security?
What is meant by the term 'availability' in the context of computer security?
Signup and view all the answers
Which of the following is NOT a main aspect of security?
Which of the following is NOT a main aspect of security?
Signup and view all the answers
What challenge often arises when trying to secure computer systems?
What challenge often arises when trying to secure computer systems?
Signup and view all the answers
What is a logic bomb primarily designed to do?
What is a logic bomb primarily designed to do?
Signup and view all the answers
How does a Trojan horse operate?
How does a Trojan horse operate?
Signup and view all the answers
What technique is commonly associated with phishing?
What technique is commonly associated with phishing?
Signup and view all the answers
What form does pharming take in social engineering?
What form does pharming take in social engineering?
Signup and view all the answers
Which of the following best describes social engineering?
Which of the following best describes social engineering?
Signup and view all the answers
What is the main goal of a logic bomb when triggered?
What is the main goal of a logic bomb when triggered?
Signup and view all the answers
In what situation might social engineering tactics be employed?
In what situation might social engineering tactics be employed?
Signup and view all the answers
Which of the following scenarios best illustrates the concept of phishing?
Which of the following scenarios best illustrates the concept of phishing?
Signup and view all the answers
What is a critical consideration when participating in peer-to-peer payment transactions?
What is a critical consideration when participating in peer-to-peer payment transactions?
Signup and view all the answers
Which of the following is NOT a recommended approach to prevent QR code scams?
Which of the following is NOT a recommended approach to prevent QR code scams?
Signup and view all the answers
What kind of scams are cybercriminals predicted to enhance using AI?
What kind of scams are cybercriminals predicted to enhance using AI?
Signup and view all the answers
Which statement about regular backups is accurate?
Which statement about regular backups is accurate?
Signup and view all the answers
What should you do if you think you've accessed a fraudulent site and shared financial information?
What should you do if you think you've accessed a fraudulent site and shared financial information?
Signup and view all the answers
What is one of the components of a secure backup process?
What is one of the components of a secure backup process?
Signup and view all the answers
What is a common tactic used in peer-to-peer payment scams?
What is a common tactic used in peer-to-peer payment scams?
Signup and view all the answers
Which type of message should raise suspicion regarding phishing attacks?
Which type of message should raise suspicion regarding phishing attacks?
Signup and view all the answers
What distinguishes information security from traditional security?
What distinguishes information security from traditional security?
Signup and view all the answers
Which of the following is NOT considered a method of enhancing security?
Which of the following is NOT considered a method of enhancing security?
Signup and view all the answers
Which of these options best describes a worm in computer security?
Which of these options best describes a worm in computer security?
Signup and view all the answers
Which option is an example of social engineering?
Which option is an example of social engineering?
Signup and view all the answers
What is the primary function of anti-virus software?
What is the primary function of anti-virus software?
Signup and view all the answers
What is the major difference between security and safety in online contexts?
What is the major difference between security and safety in online contexts?
Signup and view all the answers
Which of the following is NOT a leading threat in information security?
Which of the following is NOT a leading threat in information security?
Signup and view all the answers
Which approach is commonly recommended for recovering from a virus attack?
Which approach is commonly recommended for recovering from a virus attack?
Signup and view all the answers
What is the primary function of a botnet?
What is the primary function of a botnet?
Signup and view all the answers
Which of the following is a characteristic of a rootkit?
Which of the following is a characteristic of a rootkit?
Signup and view all the answers
Which symptom is likely to indicate a break-in or compromise?
Which symptom is likely to indicate a break-in or compromise?
Signup and view all the answers
What is a common symptom of spyware?
What is a common symptom of spyware?
Signup and view all the answers
What should be done to ensure anti-virus software remains effective?
What should be done to ensure anti-virus software remains effective?
Signup and view all the answers
Which of the following is NOT a symptom of malware detection?
Which of the following is NOT a symptom of malware detection?
Signup and view all the answers
What usually happens when a computer is compromised by a rootkit?
What usually happens when a computer is compromised by a rootkit?
Signup and view all the answers
What is one of the primary roles of anti-spyware?
What is one of the primary roles of anti-spyware?
Signup and view all the answers
What is the primary function of a firewall?
What is the primary function of a firewall?
Signup and view all the answers
Why is it important to regularly update your operating system?
Why is it important to regularly update your operating system?
Signup and view all the answers
Which of the following is essential for creating a strong password?
Which of the following is essential for creating a strong password?
Signup and view all the answers
What technique is advised for creating easily remembered passwords?
What technique is advised for creating easily remembered passwords?
Signup and view all the answers
What is a suggested best practice for accessing email attachments?
What is a suggested best practice for accessing email attachments?
Signup and view all the answers
Which characteristic defines a private password?
Which characteristic defines a private password?
Signup and view all the answers
What should you avoid doing when dealing with pop-up windows?
What should you avoid doing when dealing with pop-up windows?
Signup and view all the answers
For optimal security, how often should passwords be changed?
For optimal security, how often should passwords be changed?
Signup and view all the answers
Study Notes
Business Information Management - Week 9
- Computer Security: Techniques for ensuring data stored on a computer cannot be accessed without authorization. Most measures involve data encryption and passwords. The goal is to prevent weaknesses in the system from being exploited. Three key aspects are confidentiality, integrity, and availability.
Goals of Computer Security
-
Confidentiality: Ensures computer-related assets are accessed only by authorized parties. This is also known as secrecy or privacy.
-
Integrity: Assets can only be modified by authorized parties or in authorized ways.
-
Availability: Assets are accessible to authorized parties at the appropriate times. Loss of availability disrupts access to information.
Vulnerability, Threats & Attacks
-
Vulnerability: A weakness in the system. Can appear in hardware, operating systems, or software.
-
Threat: A circumstance that could cause harm or loss to a computing system. Threats can be human-initiated or computer-initiated.
-
Attack: A human exploiting a vulnerability or another system attacking the system (like a denial-of-service attack).
Why We Need Security
-
Good news: Employees and partners can access critical business information.
-
Bad news: Employees and partners can access critical business information, and that information can be stolen or copied. Security is needed to protect the information.
Leading Threats
-
Virus: Software designed to invade a computer, interfere with operations, copy, corrupt, or delete data. Spreads to other computers on the internet.
-
Worm: A more sophisticated virus that replicates automatically and sends itself to other computers.
-
Trojan Horse/Logic Bomb: Appears beneficial but carries harmful effects. Logic bomb triggered by a certain condition, Trojan Horse masks malicious behavior.
-
Social Engineering: Manipulating people to divulge information or take actions that compromise security. Includes phone calls, in-person interactions, or emails.
-
Botnets/Zombies: Networks of compromised computers used for malicious activities like spam, virus distribution, or denial of service attacks.
-
Rootkit: A collection of programs used to mask intrusion and gain administrator access to a computer or network.
Malware Detection
- Spyware: Programs that track or monitor users without their knowledge. Indicators include changed homepage, unusual searches, pop-up windows.
Anti-Virus & Anti-Spyware
- Importance of Updates: Attackers constantly create new threats, so anti-virus software needs regular updates to detect and destroy malware.
Firewall
- Protection: Acts as a barrier between a computer or network and the internet to prevent unauthorized access.
Protecting the Operating System
-
Regular Updates: Microsoft releases patches to resolve security issues. Automatic updates are crucial.
-
Avoid Admin Logins: Avoid logging in with administrator privileges to reduce vulnerability.
Creating a Good Password
- Complex Passwords: Passwords should be at least 8 characters, combining upper and lowercase letters, numbers, and symbols. Do not use easily guessed passwords.
Password Techniques
- Privacy: Passwords should be known to only one person.
- Secret: Passwords should not be written down.
- Easily Remembered: Easy to recall but not guessable.
- Regular Changes: Passwords should be updated regularly – every three months.
Further Tips
- Email Attachments: Do not open email attachments unless expected from trusted senders.
- Email Links: Be cautious with email links, verify validity before clicking.
- Reliable Software: Download software only from trustworthy websites.
Regular Backups
- Importance: Essential for data recovery from any loss or compromise.
Privacy
- Cost of Breaches: Data breaches have significant financial and reputational consequences.
- Cybercrime: Scams are enhanced by Artificial Intelligence, making them more convincing. (QR codes, texts, and emails).
Potential Scams (2024/2025)
- AI-Enhanced Scams: AI is used to create convincing scams impersonating legitimate people.
- QR Code Scams: QR codes are targets for scams to obtain information.
- Peer-to-Peer Payment Fraud: Increasingly common using popular payment platforms.
- Phishing Attacks: Be cautious of emails and messages requesting personal information or leading to suspicious websites.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore essential concepts in computer security including confidentiality, integrity, and availability. This week focuses on understanding vulnerabilities, threats, and the necessary safeguards to protect computer-related assets. Test your knowledge and readiness to tackle potential security challenges in modern information systems.