Podcast
Questions and Answers
What is the primary purpose of encryption?
What is the primary purpose of encryption?
Which of the following is NOT a type of encryption method?
Which of the following is NOT a type of encryption method?
What is the primary function of a firewall?
What is the primary function of a firewall?
Which of the following threats can be prevented by using encryption?
Which of the following threats can be prevented by using encryption?
Signup and view all the answers
What is the primary goal of system security?
What is the primary goal of system security?
Signup and view all the answers
What is a physical threat to a system?
What is a physical threat to a system?
Signup and view all the answers
What is a common technique used to extract passwords?
What is a common technique used to extract passwords?
Signup and view all the answers
What is a design problem related to passwords?
What is a design problem related to passwords?
Signup and view all the answers
What is an operation issue related to passwords?
What is an operation issue related to passwords?
Signup and view all the answers
What is an application issue related to passwords?
What is an application issue related to passwords?
Signup and view all the answers
What is a good practice for creating passwords?
What is a good practice for creating passwords?
Signup and view all the answers
What is an alternative to passwords?
What is an alternative to passwords?
Signup and view all the answers
What is a type of biometric data?
What is a type of biometric data?
Signup and view all the answers
What is the estimated cracking time for the password '1’mAen6Std@'?
What is the estimated cracking time for the password '1’mAen6Std@'?
Signup and view all the answers
What is the primary purpose of a Trojan horse?
What is the primary purpose of a Trojan horse?
Signup and view all the answers
What is a characteristic of a virus?
What is a characteristic of a virus?
Signup and view all the answers
Which of the following is a risk associated with spam?
Which of the following is a risk associated with spam?
Signup and view all the answers
What is a method of infection for malware?
What is a method of infection for malware?
Signup and view all the answers
What is a prevention method for malware?
What is a prevention method for malware?
Signup and view all the answers
What is a characteristic of a worm?
What is a characteristic of a worm?
Signup and view all the answers
Which of the following is a method of infection for malware?
Which of the following is a method of infection for malware?
Signup and view all the answers
What is a risk associated with malware?
What is a risk associated with malware?
Signup and view all the answers
What is the primary difference between a credit card and a debit card?
What is the primary difference between a credit card and a debit card?
Signup and view all the answers
What is an example of a fraud technique involving credit cards?
What is an example of a fraud technique involving credit cards?
Signup and view all the answers
What is a security measure used to prevent credit card fraud?
What is a security measure used to prevent credit card fraud?
Signup and view all the answers
What is a feature of smart cards?
What is a feature of smart cards?
Signup and view all the answers
What is a benefit of using RFID technology with smart cards?
What is a benefit of using RFID technology with smart cards?
Signup and view all the answers
What is a common type of fraud involving credit cards?
What is a common type of fraud involving credit cards?
Signup and view all the answers
What is a way to improve security when using credit or debit cards?
What is a way to improve security when using credit or debit cards?
Signup and view all the answers
What is a feature of smart cards that allows for more secure transactions?
What is a feature of smart cards that allows for more secure transactions?
Signup and view all the answers
What is the primary goal of Physical Network Security?
What is the primary goal of Physical Network Security?
Signup and view all the answers
Which of the following is NOT a type of Network Security category?
Which of the following is NOT a type of Network Security category?
Signup and view all the answers
What is the main purpose of keeping a backup station (DR) in Physical Network Security?
What is the main purpose of keeping a backup station (DR) in Physical Network Security?
Signup and view all the answers
Which type of attack involves intercepting packets passing through the network?
Which type of attack involves intercepting packets passing through the network?
Signup and view all the answers
What is the primary goal of Administrative Network Security?
What is the primary goal of Administrative Network Security?
Signup and view all the answers
What is Eavesdropping also known as?
What is Eavesdropping also known as?
Signup and view all the answers
What is the primary goal of Technical Network Security?
What is the primary goal of Technical Network Security?
Signup and view all the answers
Which of the following is NOT a type of Network based attack?
Which of the following is NOT a type of Network based attack?
Signup and view all the answers
Study Notes
Network Security
- Network security categories:
- Physical Network Security: prevent unauthorized physical access to network components
- Administrative Network Security: controls user behavior of using the network
- Technical Network Security: protect data stored and in transit
Physical Network Security
- Access control:
- Badges/ IDs
- Biometrics (face detection, Iris and Fingerprints)
- Smart locks
- Key pads
- Surveillance:
- 24/7 cameras
- Guards
- Sensors-based mechanisms
- Backup station (DR)
Administrative Network Security
- Allow only privileged personnel to make changes to the network
- Keep a log of the changes made
Technical Network Security
- Network-based attacks:
- Sniffing/ Eavesdropping
- Man-in-the-middle attack
- Spoofing
- Denial of Service
Eavesdropping
- Information like passwords, card details, and other sensitive data is easily stolen while it is getting transferred from one device to another
- Also known as sniffing attack
Sniffing
- Access to the network and intercept packets passing through the network
- Prevention methods:
- Intrusion Detection Systems (IDS)
- Encryption
Encryption
- Information is converted into a secret code that hides the information's true meaning
- Use a key to:
- Make the secret code
- Get the message from secret code
- Process:
- Encrypt at the sender
- Decrypt at the receiver
- Encryption methods:
- WEP, WPA, WPA2, RSA
- IPSec
Firewall
- Filters packets:
- Receiving to the network (Ingress traffic)
- Sending from the network (Egress traffic)
- Check the rules in Windows firewall for filtering packets
Prevention Methods
- Sniffing, Eavesdropping, Man-in-the-middle: Encryption
- Spoofing, DoS: IDS, Firewall
System Security
- Controls and safeguards taken to minimize:
- Downtime
- Interference
- Malicious intrusion
- Categories:
- Physical security
- OS and application security
Physical Threats to a System
- Physical access to devices
- Attaching components to devices
- Tamper with devices
- Jamming the wires
- Prevention methods:
- Access control
- Surveillance
- Backup
Attacks on OS and Applications
- Password attacks
- Malware attacks
- Pharming
- Spams
- Phishing attacks
Password Attacks
- Common technique to authenticate systems
- Can extract by:
- Sniffing
- Brute force
- Dictionary attack
- Prevention methods:
- Set a good password that cannot be guessed easily
- Account lock features
- Multi-factor authentication
- Encryption
Good Practices for Creating Passwords
- Dos:
- Lengthy password
- Case-sensitive password
- Numbers and special characters included
- Random characters
- Memorable password
- Don'ts:
- Personal data
- Short passwords
- Repetitive characters
- Same password for multiple applications
Alternatives to Passwords
- Biometric data:
- Signature
- Face recognition
- Voice recognition
- Fingerprint
- Iris pattern
- Additional questions
Malware
- Methods of infection:
- Network
- Infected files
- Websites
- USB
- Prevention methods:
- Install anti-virus software and anti-spyware software
Credit/ Debit Cards
- Allows cardholders to borrow funds to pay for goods and services
- Credit cards:
- Customer has to pay back the amount to the bank after the purchase in a given time
- Otherwise, interest is added
- Debit cards:
- Customer directly debits money from the bank account
- Frauds:
- Using credit card number and PIN number for transaction without the knowledge of the owner
- Forgery
- Prevention methods:
- Request additional information
- Verification code
- Daily transaction limit
Smart Cards
- Most credit and debit cards are now smart cards
- Includes:
- Microprocessor
- Memory chip
- RFID
- Has to place in the device instead of swiping
- RFID allows creating virtual cards instead of physical cards using smartphones
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the basics of computer security, including network security and system security. It's a part of the introduction to computer systems course.