CO1201 Computer Security Quiz
38 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary purpose of encryption?

  • To filter packets in a network
  • To detect malicious intrusions
  • To prevent physical access to devices
  • To hide the information's true meaning (correct)
  • Which of the following is NOT a type of encryption method?

  • IPSec
  • IDS (correct)
  • WEP
  • RSA
  • What is the primary function of a firewall?

  • To prevent physical access to devices
  • To encrypt data
  • To detect malicious intrusions
  • To filter packets in a network (correct)
  • Which of the following threats can be prevented by using encryption?

    <p>Sniffing, Eavesdropping, MitM</p> Signup and view all the answers

    What is the primary goal of system security?

    <p>To minimize downtime, interference, and malicious intrusion</p> Signup and view all the answers

    What is a physical threat to a system?

    <p>Physical access to devices</p> Signup and view all the answers

    What is a common technique used to extract passwords?

    <p>Sniffing</p> Signup and view all the answers

    What is a design problem related to passwords?

    <p>Using personal data</p> Signup and view all the answers

    What is an operation issue related to passwords?

    <p>Using common passwords</p> Signup and view all the answers

    What is an application issue related to passwords?

    <p>Password checking issues</p> Signup and view all the answers

    What is a good practice for creating passwords?

    <p>Using a sentence to create a password</p> Signup and view all the answers

    What is an alternative to passwords?

    <p>Biometric data</p> Signup and view all the answers

    What is a type of biometric data?

    <p>All of the above</p> Signup and view all the answers

    What is the estimated cracking time for the password '1’mAen6Std@'?

    <p>400 years</p> Signup and view all the answers

    What is the primary purpose of a Trojan horse?

    <p>To do something malicious or spy for the attacker</p> Signup and view all the answers

    What is a characteristic of a virus?

    <p>It requires user action to spread</p> Signup and view all the answers

    Which of the following is a risk associated with spam?

    <p>Time wastage</p> Signup and view all the answers

    What is a method of infection for malware?

    <p>Through infected files</p> Signup and view all the answers

    What is a prevention method for malware?

    <p>Installing anti-virus software</p> Signup and view all the answers

    What is a characteristic of a worm?

    <p>It can travel from one computer to another without user action</p> Signup and view all the answers

    Which of the following is a method of infection for malware?

    <p>Through network</p> Signup and view all the answers

    What is a risk associated with malware?

    <p>All of the above</p> Signup and view all the answers

    What is the primary difference between a credit card and a debit card?

    <p>Credit cards allow cardholders to borrow funds, while debit cards directly debit money from the bank account.</p> Signup and view all the answers

    What is an example of a fraud technique involving credit cards?

    <p>Creating a fraudulent card using an existing card number and PIN.</p> Signup and view all the answers

    What is a security measure used to prevent credit card fraud?

    <p>Requesting additional information, such as a postal code or PIN number.</p> Signup and view all the answers

    What is a feature of smart cards?

    <p>A microprocessor and memory chip in addition to a magnetic strip.</p> Signup and view all the answers

    What is a benefit of using RFID technology with smart cards?

    <p>It enables the creation of virtual cards instead of physical cards.</p> Signup and view all the answers

    What is a common type of fraud involving credit cards?

    <p>Forgery.</p> Signup and view all the answers

    What is a way to improve security when using credit or debit cards?

    <p>Requesting additional information, such as a postal code or PIN number.</p> Signup and view all the answers

    What is a feature of smart cards that allows for more secure transactions?

    <p>A microprocessor and memory chip.</p> Signup and view all the answers

    What is the primary goal of Physical Network Security?

    <p>To prevent unauthorized physical access to network components.</p> Signup and view all the answers

    Which of the following is NOT a type of Network Security category?

    <p>Information Network Security</p> Signup and view all the answers

    What is the main purpose of keeping a backup station (DR) in Physical Network Security?

    <p>To maintain network services in case of a disaster</p> Signup and view all the answers

    Which type of attack involves intercepting packets passing through the network?

    <p>Sniffing</p> Signup and view all the answers

    What is the primary goal of Administrative Network Security?

    <p>To control user behavior of using the network.</p> Signup and view all the answers

    What is Eavesdropping also known as?

    <p>Sniffing</p> Signup and view all the answers

    What is the primary goal of Technical Network Security?

    <p>To protect data stored and in transit.</p> Signup and view all the answers

    Which of the following is NOT a type of Network based attack?

    <p>Firewall</p> Signup and view all the answers

    Study Notes

    Network Security

    • Network security categories:
      • Physical Network Security: prevent unauthorized physical access to network components
      • Administrative Network Security: controls user behavior of using the network
      • Technical Network Security: protect data stored and in transit

    Physical Network Security

    • Access control:
      • Badges/ IDs
      • Biometrics (face detection, Iris and Fingerprints)
      • Smart locks
      • Key pads
    • Surveillance:
      • 24/7 cameras
      • Guards
      • Sensors-based mechanisms
    • Backup station (DR)

    Administrative Network Security

    • Allow only privileged personnel to make changes to the network
    • Keep a log of the changes made

    Technical Network Security

    • Network-based attacks:
      • Sniffing/ Eavesdropping
      • Man-in-the-middle attack
      • Spoofing
      • Denial of Service

    Eavesdropping

    • Information like passwords, card details, and other sensitive data is easily stolen while it is getting transferred from one device to another
    • Also known as sniffing attack

    Sniffing

    • Access to the network and intercept packets passing through the network
    • Prevention methods:
      • Intrusion Detection Systems (IDS)
      • Encryption

    Encryption

    • Information is converted into a secret code that hides the information's true meaning
    • Use a key to:
      • Make the secret code
      • Get the message from secret code
    • Process:
      • Encrypt at the sender
      • Decrypt at the receiver
    • Encryption methods:
      • WEP, WPA, WPA2, RSA
      • IPSec

    Firewall

    • Filters packets:
      • Receiving to the network (Ingress traffic)
      • Sending from the network (Egress traffic)
    • Check the rules in Windows firewall for filtering packets

    Prevention Methods

    • Sniffing, Eavesdropping, Man-in-the-middle: Encryption
    • Spoofing, DoS: IDS, Firewall

    System Security

    • Controls and safeguards taken to minimize:
      • Downtime
      • Interference
      • Malicious intrusion
    • Categories:
      • Physical security
      • OS and application security

    Physical Threats to a System

    • Physical access to devices
    • Attaching components to devices
    • Tamper with devices
    • Jamming the wires
    • Prevention methods:
      • Access control
      • Surveillance
      • Backup

    Attacks on OS and Applications

    • Password attacks
    • Malware attacks
    • Pharming
    • Spams
    • Phishing attacks

    Password Attacks

    • Common technique to authenticate systems
    • Can extract by:
      • Sniffing
      • Brute force
      • Dictionary attack
    • Prevention methods:
      • Set a good password that cannot be guessed easily
      • Account lock features
      • Multi-factor authentication
      • Encryption

    Good Practices for Creating Passwords

    • Dos:
      • Lengthy password
      • Case-sensitive password
      • Numbers and special characters included
      • Random characters
      • Memorable password
    • Don'ts:
      • Personal data
      • Short passwords
      • Repetitive characters
      • Same password for multiple applications

    Alternatives to Passwords

    • Biometric data:
      • Signature
      • Face recognition
      • Voice recognition
      • Fingerprint
      • Iris pattern
    • Additional questions

    Malware

    • Methods of infection:
      • Network
      • Infected files
      • Websites
      • Email
      • USB
    • Prevention methods:
      • Install anti-virus software and anti-spyware software

    Credit/ Debit Cards

    • Allows cardholders to borrow funds to pay for goods and services
    • Credit cards:
      • Customer has to pay back the amount to the bank after the purchase in a given time
      • Otherwise, interest is added
    • Debit cards:
      • Customer directly debits money from the bank account
    • Frauds:
      • Using credit card number and PIN number for transaction without the knowledge of the owner
      • Forgery
    • Prevention methods:
      • Request additional information
      • Verification code
      • Daily transaction limit

    Smart Cards

    • Most credit and debit cards are now smart cards
    • Includes:
      • Microprocessor
      • Memory chip
      • RFID
    • Has to place in the device instead of swiping
    • RFID allows creating virtual cards instead of physical cards using smartphones

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers the basics of computer security, including network security and system security. It's a part of the introduction to computer systems course.

    More Like This

    Computer Security Fundamentals
    5 questions
    Computer Security Basics
    10 questions
    Computer Security Fundamentals
    5 questions
    مقدمة في الأمن السيبراني
    10 questions
    Use Quizgecko on...
    Browser
    Browser