Computer and Cybersecurity Overview
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is computer security?

The protection of systems and information from harm, theft, and unauthorized use.

What is cybersecurity?

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

Which of the following is NOT a common category of security?

  • Operational security
  • Network security
  • End-user education
  • Application security
  • Information security
  • Disaster recovery and business continuity
  • Environmental security (correct)
  • Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

    <p>True</p> Signup and view all the answers

    Application security focuses on keeping software and devices free of threats.

    <p>True</p> Signup and view all the answers

    Information security protects the integrity and privacy of data, both in storage and in transit.

    <p>True</p> Signup and view all the answers

    Operational security includes the processes and decisions for handling and protecting data assets.

    <p>True</p> Signup and view all the answers

    Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data.

    <p>True</p> Signup and view all the answers

    What does business continuity refer to?

    <p>It's the plan the organization falls back on while trying to operate without certain resources.</p> Signup and view all the answers

    Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event.

    <p>True</p> Signup and view all the answers

    End-user education addresses the most unpredictable cyber-security factor: people.

    <p>True</p> Signup and view all the answers

    Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.

    <p>True</p> Signup and view all the answers

    The goal of information security follows three main principles: Confidentiality, Integrity, and Availability.

    <p>True</p> Signup and view all the answers

    Confidentiality is ensuring that information is available only to the intended audience.

    <p>True</p> Signup and view all the answers

    Integrity is protecting information from being modified by unauthorized parties.

    <p>True</p> Signup and view all the answers

    Availability is ensuring that when the individual that needs that piece of data to perform a job duty is ready to utilize it, it must be readily accessible.

    <p>True</p> Signup and view all the answers

    What is a firewall?

    <p>A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.</p> Signup and view all the answers

    What is a hacker?

    <p>A person who breaks into a computer system.</p> Signup and view all the answers

    What is a threat in cybersecurity?

    <p>Anything that can compromise the confidentiality, integrity, or availability of an information system.</p> Signup and view all the answers

    What is vulnerability in cybersecurity?

    <p>Any weakness in the information technology (IT) infrastructure that hackers can exploit to gain unauthorized access to data.</p> Signup and view all the answers

    Which of the following is NOT a computer security threat?

    <p>Human resources</p> Signup and view all the answers

    What are the four major threats addressed by computer security precautions?

    <p>Vandalism</p> Signup and view all the answers

    What is malware?

    <p>A collective term for malicious software or computer programs that perform malicious activities.</p> Signup and view all the answers

    Malware is always unintentional and a result of programming errors.

    <p>False</p> Signup and view all the answers

    What are worms?

    <p>Spread across computers.</p> Signup and view all the answers

    Spyware is a type of malware that infects files to spread or propagate.

    <p>False</p> Signup and view all the answers

    Spyware is different from a virus as it replicates and embeds into other device files.

    <p>False</p> Signup and view all the answers

    What is the primary function of a computer worm?

    <p>To self-replicate and infect other computers while remaining active on infected systems.</p> Signup and view all the answers

    How do worms spread?

    <p>By exploiting vulnerabilities on the target system or using some kind of social engineering to trick users into executing them.</p> Signup and view all the answers

    Worms require an infected host to spread.

    <p>False</p> Signup and view all the answers

    A bot is a malware.

    <p>False</p> Signup and view all the answers

    Which of the following is NOT a distribution channel for malware?

    <p>Social engineering</p> Signup and view all the answers

    What is phishing?

    <p>Sending out a spoofed email that appears to come from a legitimate company.</p> Signup and view all the answers

    Why is phishing effective?

    <p>It often demands urgent action, which can lead the victim to act without thinking.</p> Signup and view all the answers

    A phishing email can include a link that is used to steal the victim's personal information or install malware on the mobile device.

    <p>True</p> Signup and view all the answers

    A denial of service attack (DoS) is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services and resources.

    <p>True</p> Signup and view all the answers

    In a DoS attack, rapid and continuous online requests are sent to a target server to overload the server's bandwidth.

    <p>True</p> Signup and view all the answers

    A distributed denial of service (DDoS) attack is a common type of DoS attack.

    <p>True</p> Signup and view all the answers

    Unlike most cyberattacks initiated to steal sensitive information, initial DDoS attacks are launched to make websites inaccessible to their users.

    <p>True</p> Signup and view all the answers

    DDoS attacks can serve as a facade for other malicious acts.

    <p>True</p> Signup and view all the answers

    Study Notes

    Computer and Cybersecurity

    • Computer Security: Protecting computer systems and information from harm, theft, and unauthorized use. Hardware protection uses standard security measures like serial numbers, locks, and alarms. Protecting information and system access uses more complex tactics.

    • Cybersecurity: Protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Also known as information technology security or electronic information security. It encompasses a broad range of contexts, from business to mobile computing.

    Common Security Categories

    • Network Security: Securing computer networks from intruders, whether targeted attackers or opportunistic malware.

    • Application Security: Keeping software and devices free of threats. A compromised application can provide access to sensitive data. Successful security begins in the design stage, before deployment.

    • Information Security: Protecting the integrity and privacy of data, both in storage and transit.

    • Operational Security: Includes the processes and decisions for handling and protecting data assets. Access permissions and procedures for data storage and sharing fall under this category.

    • Disaster Recovery and Business Continuity: Defining how an organization responds to cybersecurity incidents or events causing operational or data loss. This includes restoring operations and information to their pre-incident state. This involves policies that dictate recovery steps.

    • End-User Education: Critical to mitigate the unpredictable human factor in cybersecurity. Includes teaching users to avoid suspicious emails, attachments, or links. Important to educate users on the vital role they play in maintaining security.

    CIA Triad

    • Confidentiality: Ensuring information is accessible only to the intended audience.

    • Integrity: Protecting information from unauthorized modification.

    • Availability: Ensuring information is readily accessible to authorized users when needed.

    Good Security Practices for Individuals

    • Install Antivirus and Anti-malware Software: Verify the software legitimacy to minimize vulnerabilities, keep updated.

    • Use Strong Passwords: Avoid reusing passwords across multiple accounts and websites. Change passwords on a schedule for better security, and avoid saving them on insecure sites.

    • Log off Public Computers: Public computers are susceptible to malware, so log out completely after use.

    • Save and Back up Data: Implement regular data backups to protect against inevitable events like hardware failure or virus infection. Validate backup files to ensure they can be easily restored.

    • Limit Social Network Information: Be cautious about personal information shared online. Use privacy and security settings to protect yourself and personal information.

    • Download Files Legally: Avoid peer-to-peer (P2P) networks and file-sharing clients.

    • Keep Personal Information Safe: Avoid clicking on suspicious links or divulging information online if unsure of the sender or website. Be wary of phishing attempts which try to trick users.

    • Lock Your Computer: Lock devices when unattended to maintain security.

    • Keep Applications Up-to-Date: Enable automatic updates or manually ensure all applications are current to mitigate vulnerabilities.

    Malware

    • Malware: A general term to describe various malicious software. These softwares are unwanted and potentially dangerous.

    • Different types of Malware: Ransomware, Spyware, Adware, Worms, Trojans, Botnets, Viruses.

    • Software Bugs vs Malicious Activities: Understanding that software errors (bugs) differ from the intentional actions of malware.

    Distribution Channels for Malware

    • Download: Unintended downloads from the internet.

    • Unsolicited Email: Unwanted attachments or embedded links.

    • Physical Media: Integrated or removable media (thumb drives).

    • Self-Propagation: Malware's ability to spread from computer to computer.

    Common Computer Fraud Techniques

    • Phishing: Spoofed emails that appear to come from legitimate companies, tricking users into revealing information on fake Websites. Attackers also use fraudulent texts and voicemails to collect sensitive data. Examples of actions include clicking on attachments, enabling macros in documents, updating passwords, and connecting to new Wi-Fi hotspots.

    • Denial-of-Service (DoS) Attacks: Overloading a service or website or servers with traffic to make it unusable, or very slow.

    • Distributed Denial-of-Service (DDoS) Attacks: Similar to DoS, but using multiple compromised systems to overwhelm the target, making it very hard to defend against.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    Dive into the essentials of computer and cybersecurity, examining key concepts such as computer security, cybersecurity, and various security categories. This quiz will enhance your understanding of how to protect systems from threats and malicious attacks. Test your knowledge about network security, application security, and information security.

    More Like This

    Computer Security and Cyber Security Quiz
    5 questions

    Computer Security and Cyber Security Quiz

    ConsistentTropicalRainforest avatar
    ConsistentTropicalRainforest
    Computer and Network Security
    5 questions

    Computer and Network Security

    HeavenlyStarlitSky3474 avatar
    HeavenlyStarlitSky3474
    CO1201 Computer Security Quiz
    38 questions
    Use Quizgecko on...
    Browser
    Browser