Business Information Management - Week 9
48 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of computer security?

  • To ensure that data cannot be accessed without authorization (correct)
  • To maximize the connectivity of devices
  • To increase the speed of data retrieval
  • To minimize the amount of data stored

Which aspect of computer security guarantees that information is only modified by authorized individuals?

  • Availability
  • Accessibility
  • Integrity (correct)
  • Confidentiality

What term describes a weakness in a security system that could be exploited?

  • Threat
  • Compromise
  • Vulnerability (correct)
  • Attack

What is a common example of a denial-of-service attack?

<p>Flooding a server with excessive requests (D)</p> Signup and view all the answers

Which situation describes a threat to a computer system?

<p>A hacker attempting to breach a system (D)</p> Signup and view all the answers

What is meant by the term 'availability' in the context of computer security?

<p>Ensuring that assets are accessible to authorized parties when needed (D)</p> Signup and view all the answers

Which of the following is NOT a main aspect of security?

<p>Analysis (A)</p> Signup and view all the answers

What challenge often arises when trying to secure computer systems?

<p>Balancing the goals of security, which may conflict (B)</p> Signup and view all the answers

What is a logic bomb primarily designed to do?

<p>Perform harmful actions when certain conditions are met (C)</p> Signup and view all the answers

How does a Trojan horse operate?

<p>It appears to be a useful program while causing harm in the background (B)</p> Signup and view all the answers

What technique is commonly associated with phishing?

<p>Sending emails that appear to come from legitimate entities (D)</p> Signup and view all the answers

What form does pharming take in social engineering?

<p>Redirecting a user's session to a fraudulent website (B)</p> Signup and view all the answers

Which of the following best describes social engineering?

<p>Manipulating individuals to obtain confidential data (A)</p> Signup and view all the answers

What is the main goal of a logic bomb when triggered?

<p>To delete or corrupt data (D)</p> Signup and view all the answers

In what situation might social engineering tactics be employed?

<p>To gain unauthorized access to computer systems (C)</p> Signup and view all the answers

Which of the following scenarios best illustrates the concept of phishing?

<p>An email requests a user’s bank account credentials under a false pretext (C)</p> Signup and view all the answers

What is a critical consideration when participating in peer-to-peer payment transactions?

<p>Always verify the identity of the recipient before transferring funds. (D)</p> Signup and view all the answers

Which of the following is NOT a recommended approach to prevent QR code scams?

<p>Scan any QR code that seems interesting. (A)</p> Signup and view all the answers

What kind of scams are cybercriminals predicted to enhance using AI?

<p>Impersonation scams through convincing texts and deepfakes. (C)</p> Signup and view all the answers

Which statement about regular backups is accurate?

<p>Automated and secured off-site backups can safeguard important data. (D)</p> Signup and view all the answers

What should you do if you think you've accessed a fraudulent site and shared financial information?

<p>Contact your bank immediately. (C)</p> Signup and view all the answers

What is one of the components of a secure backup process?

<p>Make sure backups are recent and tested. (B)</p> Signup and view all the answers

What is a common tactic used in peer-to-peer payment scams?

<p>Fake payment notifications and overpayment scams. (C)</p> Signup and view all the answers

Which type of message should raise suspicion regarding phishing attacks?

<p>Messages asking for personal information. (D)</p> Signup and view all the answers

What distinguishes information security from traditional security?

<p>Confidential information can still exist even if copied. (B)</p> Signup and view all the answers

Which of the following is NOT considered a method of enhancing security?

<p>Using unsecured public Wi-Fi (A)</p> Signup and view all the answers

Which of these options best describes a worm in computer security?

<p>A self-replicating program that spreads without human action. (A)</p> Signup and view all the answers

Which option is an example of social engineering?

<p>Sending phishing emails to obtain sensitive information. (D)</p> Signup and view all the answers

What is the primary function of anti-virus software?

<p>To detect and remove malicious software. (B)</p> Signup and view all the answers

What is the major difference between security and safety in online contexts?

<p>Security involves protecting systems while safety involves user behavior. (A)</p> Signup and view all the answers

Which of the following is NOT a leading threat in information security?

<p>Software updates (D)</p> Signup and view all the answers

Which approach is commonly recommended for recovering from a virus attack?

<p>Reinstall the operating system as a definitive solution. (D)</p> Signup and view all the answers

What is the primary function of a botnet?

<p>To send spam, viruses, or perform denial of service attacks. (B)</p> Signup and view all the answers

Which of the following is a characteristic of a rootkit?

<p>It provides administrator-level access and masks an attack. (B)</p> Signup and view all the answers

Which symptom is likely to indicate a break-in or compromise?

<p>Unexpected transactions or files appearing. (A)</p> Signup and view all the answers

What is a common symptom of spyware?

<p>Installations of new applications without consent. (A)</p> Signup and view all the answers

What should be done to ensure anti-virus software remains effective?

<p>Set it to auto-update regularly. (A)</p> Signup and view all the answers

Which of the following is NOT a symptom of malware detection?

<p>Increased disk storage space. (D)</p> Signup and view all the answers

What usually happens when a computer is compromised by a rootkit?

<p>Evidence of a break-in is eliminated. (B)</p> Signup and view all the answers

What is one of the primary roles of anti-spyware?

<p>To detect and remove spyware before it can cause harm. (A)</p> Signup and view all the answers

What is the primary function of a firewall?

<p>To act as a barrier against unauthorized access (B)</p> Signup and view all the answers

Why is it important to regularly update your operating system?

<p>It ensures the computer is protected against known vulnerabilities (A)</p> Signup and view all the answers

Which of the following is essential for creating a strong password?

<p>Including at least 8 characters and a combination of different character types (A)</p> Signup and view all the answers

What technique is advised for creating easily remembered passwords?

<p>Abbreviating a phrase or combining unrelated words (D)</p> Signup and view all the answers

What is a suggested best practice for accessing email attachments?

<p>Open attachments only if you trust the sender and expect them (B)</p> Signup and view all the answers

Which characteristic defines a private password?

<p>It is known and used by only one person (C)</p> Signup and view all the answers

What should you avoid doing when dealing with pop-up windows?

<p>Clicking anywhere in the pop-up (A)</p> Signup and view all the answers

For optimal security, how often should passwords be changed?

<p>Every three months (C)</p> Signup and view all the answers

Flashcards

What is computer security?

The practice of protecting data stored in a computer from unauthorized access or modification. Often involves using data encryption and passwords.

Confidentiality

Ensuring that only authorized individuals can access computer-related assets, similar to keeping secrets or ensuring privacy.

Integrity

Guaranteeing that only authorized parties can modify computer assets and that changes are made in authorized ways.

Availability

Making sure authorized users can access computer assets at appropriate times. Loss of availability means information becomes inaccessible.

Signup and view all the flashcards

Vulnerability

A weakness in a system's security that can be exploited by attackers, such as flaws in hardware, operating systems, or software.

Signup and view all the flashcards

Threat

A set of circumstances that could potentially cause harm or loss to a computer system. Threats can be initiated by humans or other systems.

Signup and view all the flashcards

Attack

An attempt to exploit a vulnerability in a system, often by a human attacker. Attacks can also be launched automatically by other systems.

Signup and view all the flashcards

Security

The practice of protecting valuable assets, typically involving prevention, detection, and reaction to potential security threats.

Signup and view all the flashcards

Information Security Theft

Data can be copied or stolen without your knowledge, making it harder to detect.

Signup and view all the flashcards

Safety

How we behave online to protect ourselves from risks, like safe email practices and downloading software.

Signup and view all the flashcards

Computer Virus

Malicious software programs designed to damage or disrupt computer systems.

Signup and view all the flashcards

Worm

A virus that replicates automatically and spreads to other computers, often using email.

Signup and view all the flashcards

Social Engineering

Techniques used to gain unauthorized access to systems by deceiving users, often through social manipulation.

Signup and view all the flashcards

Botnet

A network of hijacked computers controlled by a single entity for malicious purposes.

Signup and view all the flashcards

Rootkit

A type of malware that hides its presence and activities, making it difficult to detect.

Signup and view all the flashcards

What is a logic bomb?

A malicious program designed to damage a system when a specific condition is met. It's like a time bomb waiting to explode!

Signup and view all the flashcards

What is a Trojan Horse?

A program that disguises itself as useful software while secretly causing harm. Like a wolf in sheep's clothing!

Signup and view all the flashcards

What is Social Engineering?

It manipulates people into giving away sensitive information by building trust and exploiting vulnerabilities.

Signup and view all the flashcards

What is Phishing?

When someone pretends to be a trusted entity, like your bank, and requests sensitive information through an email.

Signup and view all the flashcards

What is Pharming?

Manipulates users into visiting fake websites that mimic legitimate ones.

Signup and view all the flashcards

What is a security vulnerability?

A security vulnerability that makes a system susceptible to attack.

Signup and view all the flashcards

What is a security attack?

The set of actions taken to break into a system.

Signup and view all the flashcards

Phishing website

A fake website designed to trick users into providing login credentials or other sensitive information.

Signup and view all the flashcards

Spyware

A software program designed to track and steal personal information from users' computers.

Signup and view all the flashcards

Virus

A type of malware that replicates itself and spreads to other computers.

Signup and view all the flashcards

Anti-virus software

Software designed to detect and remove malware from a computer system.

Signup and view all the flashcards

Denial of service (DoS) attack

A type of attack that overwhelms a server with traffic, making it unavailable to legitimate users.

Signup and view all the flashcards

Spoofing

A technique used to mimic a legitimate website to steal user credentials.

Signup and view all the flashcards

What is a firewall?

A program that acts as a barrier between your computer and the internet, blocking unauthorized connections from hackers.

Signup and view all the flashcards

Why are operating system updates important?

Regular software updates from Microsoft address security vulnerabilities, making your computer less susceptible to hackers.

Signup and view all the flashcards

What makes a good password?

A combination of at least 3 different character types (uppercase, lowercase, numbers, symbols) for better security.

Signup and view all the flashcards

What are the characteristics of a strong password?

A strong password should be unique, at least 8 characters long, and use a mix of uppercase, lowercase, numbers, and symbols.

Signup and view all the flashcards

Why should passwords be kept private?

Passwords should be kept secret and not written down, as they can be easily compromised.

Signup and view all the flashcards

How can you stay safe from malicious emails?

Be cautious about opening email attachments or clicking on links from unknown senders, as they could contain malicious software.

Signup and view all the flashcards

What are pop-up blockers?

Pop-up blockers prevent unwanted advertisements that can sometimes be malicious.

Signup and view all the flashcards

How should you close pop-up windows?

Close pop-up windows using the 'X' button in the corner to avoid accidentally clicking on malicious links.

Signup and view all the flashcards

Regular Backups

A security practice that involves regularly creating copies of important data to prevent data loss in case of a disaster or system failure.

Signup and view all the flashcards

Peer-to-Peer Payment Fraud

A type of fraud that targets users of peer-to-peer (P2P) payment platforms like Venmo or Zelle. Scammers use tactics like overpayment scams, fake payment notifications, and two-step authentication scams to trick users into sending money or revealing sensitive information.

Signup and view all the flashcards

Phishing Attack

An email or message designed to trick users into revealing sensitive information, such as login credentials or credit card details. Often leads to identity theft or financial loss.

Signup and view all the flashcards

AI-Enhanced Scams

A fraudulent strategy using AI to create realistic and convincing messages, emails, or images to trick users into releasing personal information or money.

Signup and view all the flashcards

QR Code Scams

A security risk associated with QR codes. Scammers can create fake QR codes that lead to malicious websites or steal your credentials.

Signup and view all the flashcards

Verifying QR Code Source

Double-checking the source and content of a QR code before scanning it to reduce the risk of being a victim of scams.

Signup and view all the flashcards

Avoiding Random QR Code Scans

Avoiding scanning random QR codes to prevent potential security risks. Only scan a QR code if you are positive about its legitimacy.

Signup and view all the flashcards

Contacting Bank After A Fraudulent Site Access

contacting your bank immediately if you believe you have accessed a fraudulent website and compromised your financial information.

Signup and view all the flashcards

Study Notes

Business Information Management - Week 9

  • Computer Security: Techniques for ensuring data stored on a computer cannot be accessed without authorization. Most measures involve data encryption and passwords. The goal is to prevent weaknesses in the system from being exploited. Three key aspects are confidentiality, integrity, and availability.

Goals of Computer Security

  • Confidentiality: Ensures computer-related assets are accessed only by authorized parties. This is also known as secrecy or privacy.

  • Integrity: Assets can only be modified by authorized parties or in authorized ways.

  • Availability: Assets are accessible to authorized parties at the appropriate times. Loss of availability disrupts access to information.

Vulnerability, Threats & Attacks

  • Vulnerability: A weakness in the system. Can appear in hardware, operating systems, or software.

  • Threat: A circumstance that could cause harm or loss to a computing system. Threats can be human-initiated or computer-initiated.

  • Attack: A human exploiting a vulnerability or another system attacking the system (like a denial-of-service attack).

Why We Need Security

  • Good news: Employees and partners can access critical business information.

  • Bad news: Employees and partners can access critical business information, and that information can be stolen or copied. Security is needed to protect the information.

Leading Threats

  • Virus: Software designed to invade a computer, interfere with operations, copy, corrupt, or delete data. Spreads to other computers on the internet.

  • Worm: A more sophisticated virus that replicates automatically and sends itself to other computers.

  • Trojan Horse/Logic Bomb: Appears beneficial but carries harmful effects. Logic bomb triggered by a certain condition, Trojan Horse masks malicious behavior.

  • Social Engineering: Manipulating people to divulge information or take actions that compromise security. Includes phone calls, in-person interactions, or emails.

  • Botnets/Zombies: Networks of compromised computers used for malicious activities like spam, virus distribution, or denial of service attacks.

  • Rootkit: A collection of programs used to mask intrusion and gain administrator access to a computer or network.

Malware Detection

  • Spyware: Programs that track or monitor users without their knowledge. Indicators include changed homepage, unusual searches, pop-up windows.

Anti-Virus & Anti-Spyware

  • Importance of Updates: Attackers constantly create new threats, so anti-virus software needs regular updates to detect and destroy malware.

Firewall

  • Protection: Acts as a barrier between a computer or network and the internet to prevent unauthorized access.

Protecting the Operating System

  • Regular Updates: Microsoft releases patches to resolve security issues. Automatic updates are crucial.

  • Avoid Admin Logins: Avoid logging in with administrator privileges to reduce vulnerability.

Creating a Good Password

  • Complex Passwords: Passwords should be at least 8 characters, combining upper and lowercase letters, numbers, and symbols. Do not use easily guessed passwords.

Password Techniques

  • Privacy: Passwords should be known to only one person.
  • Secret: Passwords should not be written down.
  • Easily Remembered: Easy to recall but not guessable.
  • Regular Changes: Passwords should be updated regularly – every three months.

Further Tips

  • Email Attachments: Do not open email attachments unless expected from trusted senders.
  • Email Links: Be cautious with email links, verify validity before clicking.
  • Reliable Software: Download software only from trustworthy websites.

Regular Backups

  • Importance: Essential for data recovery from any loss or compromise.

Privacy

  • Cost of Breaches: Data breaches have significant financial and reputational consequences.
  • Cybercrime: Scams are enhanced by Artificial Intelligence, making them more convincing. (QR codes, texts, and emails).

Potential Scams (2024/2025)

  • AI-Enhanced Scams: AI is used to create convincing scams impersonating legitimate people.
  • QR Code Scams: QR codes are targets for scams to obtain information.
  • Peer-to-Peer Payment Fraud: Increasingly common using popular payment platforms.
  • Phishing Attacks: Be cautious of emails and messages requesting personal information or leading to suspicious websites.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Explore essential concepts in computer security including confidentiality, integrity, and availability. This week focuses on understanding vulnerabilities, threats, and the necessary safeguards to protect computer-related assets. Test your knowledge and readiness to tackle potential security challenges in modern information systems.

More Like This

Computer Security Quiz
10 questions

Computer Security Quiz

ThumbsUpFantasy avatar
ThumbsUpFantasy
Computer Security Risks Quiz
11 questions
Information Security Protection Goals
10 questions
أمان الهواتف
26 questions

أمان الهواتف

ArticulateEmpowerment avatar
ArticulateEmpowerment
Use Quizgecko on...
Browser
Browser