Business Information Management - Week 9
48 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of computer security?

  • To ensure that data cannot be accessed without authorization (correct)
  • To maximize the connectivity of devices
  • To increase the speed of data retrieval
  • To minimize the amount of data stored
  • Which aspect of computer security guarantees that information is only modified by authorized individuals?

  • Availability
  • Accessibility
  • Integrity (correct)
  • Confidentiality
  • What term describes a weakness in a security system that could be exploited?

  • Threat
  • Compromise
  • Vulnerability (correct)
  • Attack
  • What is a common example of a denial-of-service attack?

    <p>Flooding a server with excessive requests</p> Signup and view all the answers

    Which situation describes a threat to a computer system?

    <p>A hacker attempting to breach a system</p> Signup and view all the answers

    What is meant by the term 'availability' in the context of computer security?

    <p>Ensuring that assets are accessible to authorized parties when needed</p> Signup and view all the answers

    Which of the following is NOT a main aspect of security?

    <p>Analysis</p> Signup and view all the answers

    What challenge often arises when trying to secure computer systems?

    <p>Balancing the goals of security, which may conflict</p> Signup and view all the answers

    What is a logic bomb primarily designed to do?

    <p>Perform harmful actions when certain conditions are met</p> Signup and view all the answers

    How does a Trojan horse operate?

    <p>It appears to be a useful program while causing harm in the background</p> Signup and view all the answers

    What technique is commonly associated with phishing?

    <p>Sending emails that appear to come from legitimate entities</p> Signup and view all the answers

    What form does pharming take in social engineering?

    <p>Redirecting a user's session to a fraudulent website</p> Signup and view all the answers

    Which of the following best describes social engineering?

    <p>Manipulating individuals to obtain confidential data</p> Signup and view all the answers

    What is the main goal of a logic bomb when triggered?

    <p>To delete or corrupt data</p> Signup and view all the answers

    In what situation might social engineering tactics be employed?

    <p>To gain unauthorized access to computer systems</p> Signup and view all the answers

    Which of the following scenarios best illustrates the concept of phishing?

    <p>An email requests a user’s bank account credentials under a false pretext</p> Signup and view all the answers

    What is a critical consideration when participating in peer-to-peer payment transactions?

    <p>Always verify the identity of the recipient before transferring funds.</p> Signup and view all the answers

    Which of the following is NOT a recommended approach to prevent QR code scams?

    <p>Scan any QR code that seems interesting.</p> Signup and view all the answers

    What kind of scams are cybercriminals predicted to enhance using AI?

    <p>Impersonation scams through convincing texts and deepfakes.</p> Signup and view all the answers

    Which statement about regular backups is accurate?

    <p>Automated and secured off-site backups can safeguard important data.</p> Signup and view all the answers

    What should you do if you think you've accessed a fraudulent site and shared financial information?

    <p>Contact your bank immediately.</p> Signup and view all the answers

    What is one of the components of a secure backup process?

    <p>Make sure backups are recent and tested.</p> Signup and view all the answers

    What is a common tactic used in peer-to-peer payment scams?

    <p>Fake payment notifications and overpayment scams.</p> Signup and view all the answers

    Which type of message should raise suspicion regarding phishing attacks?

    <p>Messages asking for personal information.</p> Signup and view all the answers

    What distinguishes information security from traditional security?

    <p>Confidential information can still exist even if copied.</p> Signup and view all the answers

    Which of the following is NOT considered a method of enhancing security?

    <p>Using unsecured public Wi-Fi</p> Signup and view all the answers

    Which of these options best describes a worm in computer security?

    <p>A self-replicating program that spreads without human action.</p> Signup and view all the answers

    Which option is an example of social engineering?

    <p>Sending phishing emails to obtain sensitive information.</p> Signup and view all the answers

    What is the primary function of anti-virus software?

    <p>To detect and remove malicious software.</p> Signup and view all the answers

    What is the major difference between security and safety in online contexts?

    <p>Security involves protecting systems while safety involves user behavior.</p> Signup and view all the answers

    Which of the following is NOT a leading threat in information security?

    <p>Software updates</p> Signup and view all the answers

    Which approach is commonly recommended for recovering from a virus attack?

    <p>Reinstall the operating system as a definitive solution.</p> Signup and view all the answers

    What is the primary function of a botnet?

    <p>To send spam, viruses, or perform denial of service attacks.</p> Signup and view all the answers

    Which of the following is a characteristic of a rootkit?

    <p>It provides administrator-level access and masks an attack.</p> Signup and view all the answers

    Which symptom is likely to indicate a break-in or compromise?

    <p>Unexpected transactions or files appearing.</p> Signup and view all the answers

    What is a common symptom of spyware?

    <p>Installations of new applications without consent.</p> Signup and view all the answers

    What should be done to ensure anti-virus software remains effective?

    <p>Set it to auto-update regularly.</p> Signup and view all the answers

    Which of the following is NOT a symptom of malware detection?

    <p>Increased disk storage space.</p> Signup and view all the answers

    What usually happens when a computer is compromised by a rootkit?

    <p>Evidence of a break-in is eliminated.</p> Signup and view all the answers

    What is one of the primary roles of anti-spyware?

    <p>To detect and remove spyware before it can cause harm.</p> Signup and view all the answers

    What is the primary function of a firewall?

    <p>To act as a barrier against unauthorized access</p> Signup and view all the answers

    Why is it important to regularly update your operating system?

    <p>It ensures the computer is protected against known vulnerabilities</p> Signup and view all the answers

    Which of the following is essential for creating a strong password?

    <p>Including at least 8 characters and a combination of different character types</p> Signup and view all the answers

    What technique is advised for creating easily remembered passwords?

    <p>Abbreviating a phrase or combining unrelated words</p> Signup and view all the answers

    What is a suggested best practice for accessing email attachments?

    <p>Open attachments only if you trust the sender and expect them</p> Signup and view all the answers

    Which characteristic defines a private password?

    <p>It is known and used by only one person</p> Signup and view all the answers

    What should you avoid doing when dealing with pop-up windows?

    <p>Clicking anywhere in the pop-up</p> Signup and view all the answers

    For optimal security, how often should passwords be changed?

    <p>Every three months</p> Signup and view all the answers

    Study Notes

    Business Information Management - Week 9

    • Computer Security: Techniques for ensuring data stored on a computer cannot be accessed without authorization. Most measures involve data encryption and passwords. The goal is to prevent weaknesses in the system from being exploited. Three key aspects are confidentiality, integrity, and availability.

    Goals of Computer Security

    • Confidentiality: Ensures computer-related assets are accessed only by authorized parties. This is also known as secrecy or privacy.

    • Integrity: Assets can only be modified by authorized parties or in authorized ways.

    • Availability: Assets are accessible to authorized parties at the appropriate times. Loss of availability disrupts access to information.

    Vulnerability, Threats & Attacks

    • Vulnerability: A weakness in the system. Can appear in hardware, operating systems, or software.

    • Threat: A circumstance that could cause harm or loss to a computing system. Threats can be human-initiated or computer-initiated.

    • Attack: A human exploiting a vulnerability or another system attacking the system (like a denial-of-service attack).

    Why We Need Security

    • Good news: Employees and partners can access critical business information.

    • Bad news: Employees and partners can access critical business information, and that information can be stolen or copied. Security is needed to protect the information.

    Leading Threats

    • Virus: Software designed to invade a computer, interfere with operations, copy, corrupt, or delete data. Spreads to other computers on the internet.

    • Worm: A more sophisticated virus that replicates automatically and sends itself to other computers.

    • Trojan Horse/Logic Bomb: Appears beneficial but carries harmful effects. Logic bomb triggered by a certain condition, Trojan Horse masks malicious behavior.

    • Social Engineering: Manipulating people to divulge information or take actions that compromise security. Includes phone calls, in-person interactions, or emails.

    • Botnets/Zombies: Networks of compromised computers used for malicious activities like spam, virus distribution, or denial of service attacks.

    • Rootkit: A collection of programs used to mask intrusion and gain administrator access to a computer or network.

    Malware Detection

    • Spyware: Programs that track or monitor users without their knowledge. Indicators include changed homepage, unusual searches, pop-up windows.

    Anti-Virus & Anti-Spyware

    • Importance of Updates: Attackers constantly create new threats, so anti-virus software needs regular updates to detect and destroy malware.

    Firewall

    • Protection: Acts as a barrier between a computer or network and the internet to prevent unauthorized access.

    Protecting the Operating System

    • Regular Updates: Microsoft releases patches to resolve security issues. Automatic updates are crucial.

    • Avoid Admin Logins: Avoid logging in with administrator privileges to reduce vulnerability.

    Creating a Good Password

    • Complex Passwords: Passwords should be at least 8 characters, combining upper and lowercase letters, numbers, and symbols. Do not use easily guessed passwords.

    Password Techniques

    • Privacy: Passwords should be known to only one person.
    • Secret: Passwords should not be written down.
    • Easily Remembered: Easy to recall but not guessable.
    • Regular Changes: Passwords should be updated regularly – every three months.

    Further Tips

    • Email Attachments: Do not open email attachments unless expected from trusted senders.
    • Email Links: Be cautious with email links, verify validity before clicking.
    • Reliable Software: Download software only from trustworthy websites.

    Regular Backups

    • Importance: Essential for data recovery from any loss or compromise.

    Privacy

    • Cost of Breaches: Data breaches have significant financial and reputational consequences.
    • Cybercrime: Scams are enhanced by Artificial Intelligence, making them more convincing. (QR codes, texts, and emails).

    Potential Scams (2024/2025)

    • AI-Enhanced Scams: AI is used to create convincing scams impersonating legitimate people.
    • QR Code Scams: QR codes are targets for scams to obtain information.
    • Peer-to-Peer Payment Fraud: Increasingly common using popular payment platforms.
    • Phishing Attacks: Be cautious of emails and messages requesting personal information or leading to suspicious websites.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Explore essential concepts in computer security including confidentiality, integrity, and availability. This week focuses on understanding vulnerabilities, threats, and the necessary safeguards to protect computer-related assets. Test your knowledge and readiness to tackle potential security challenges in modern information systems.

    More Like This

    Computer Security Quiz
    10 questions

    Computer Security Quiz

    ThumbsUpFantasy avatar
    ThumbsUpFantasy
    Computer Security Risks Quiz
    11 questions
    Information Security Protection Goals
    10 questions
    Information Security Fundamentals
    24 questions
    Use Quizgecko on...
    Browser
    Browser