Computer and Cybersecurity Overview
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is computer security?

The protection of systems and information from harm, theft, and unauthorized use.

What is cybersecurity?

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

Which of the following is NOT a common category of security?

  • Operational security
  • Network security
  • End-user education
  • Application security
  • Information security
  • Disaster recovery and business continuity
  • Environmental security (correct)

Network security is the practice of securing a computer network from intruders, whether targeted attackers or opportunistic malware.

<p>True (A)</p> Signup and view all the answers

Application security focuses on keeping software and devices free of threats.

<p>True (A)</p> Signup and view all the answers

Information security protects the integrity and privacy of data, both in storage and in transit.

<p>True (A)</p> Signup and view all the answers

Operational security includes the processes and decisions for handling and protecting data assets.

<p>True (A)</p> Signup and view all the answers

Disaster recovery and business continuity define how an organization responds to a cyber-security incident or any other event that causes the loss of operations or data.

<p>True (A)</p> Signup and view all the answers

What does business continuity refer to?

<p>It's the plan the organization falls back on while trying to operate without certain resources.</p> Signup and view all the answers

Disaster recovery policies dictate how the organization restores its operations and information to return to the same operating capacity as before the event.

<p>True (A)</p> Signup and view all the answers

End-user education addresses the most unpredictable cyber-security factor: people.

<p>True (A)</p> Signup and view all the answers

Teaching users to delete suspicious email attachments, not plug in unidentified USB drives, and various other important lessons is vital for the security of any organization.

<p>True (A)</p> Signup and view all the answers

The goal of information security follows three main principles: Confidentiality, Integrity, and Availability.

<p>True (A)</p> Signup and view all the answers

Confidentiality is ensuring that information is available only to the intended audience.

<p>True (A)</p> Signup and view all the answers

Integrity is protecting information from being modified by unauthorized parties.

<p>True (A)</p> Signup and view all the answers

Availability is ensuring that when the individual that needs that piece of data to perform a job duty is ready to utilize it, it must be readily accessible.

<p>True (A)</p> Signup and view all the answers

What is a firewall?

<p>A network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.</p> Signup and view all the answers

What is a hacker?

<p>A person who breaks into a computer system.</p> Signup and view all the answers

What is a threat in cybersecurity?

<p>Anything that can compromise the confidentiality, integrity, or availability of an information system.</p> Signup and view all the answers

What is vulnerability in cybersecurity?

<p>Any weakness in the information technology (IT) infrastructure that hackers can exploit to gain unauthorized access to data.</p> Signup and view all the answers

Which of the following is NOT a computer security threat?

<p>Human resources (A)</p> Signup and view all the answers

What are the four major threats addressed by computer security precautions?

<p>Vandalism (A), Theft of data (B), Fraud (C), Invasion of privacy (D)</p> Signup and view all the answers

What is malware?

<p>A collective term for malicious software or computer programs that perform malicious activities.</p> Signup and view all the answers

Malware is always unintentional and a result of programming errors.

<p>False (B)</p> Signup and view all the answers

What are worms?

<p>Spread across computers.</p> Signup and view all the answers

Spyware is a type of malware that infects files to spread or propagate.

<p>False (B)</p> Signup and view all the answers

Spyware is different from a virus as it replicates and embeds into other device files.

<p>False (B)</p> Signup and view all the answers

What is the primary function of a computer worm?

<p>To self-replicate and infect other computers while remaining active on infected systems.</p> Signup and view all the answers

How do worms spread?

<p>By exploiting vulnerabilities on the target system or using some kind of social engineering to trick users into executing them.</p> Signup and view all the answers

Worms require an infected host to spread.

<p>False (B)</p> Signup and view all the answers

A bot is a malware.

<p>False (B)</p> Signup and view all the answers

Which of the following is NOT a distribution channel for malware?

<p>Social engineering (A)</p> Signup and view all the answers

What is phishing?

<p>Sending out a spoofed email that appears to come from a legitimate company.</p> Signup and view all the answers

Why is phishing effective?

<p>It often demands urgent action, which can lead the victim to act without thinking.</p> Signup and view all the answers

A phishing email can include a link that is used to steal the victim's personal information or install malware on the mobile device.

<p>True (A)</p> Signup and view all the answers

A denial of service attack (DoS) is a cyberattack on devices, information systems, or other network resources that prevents legitimate users from accessing expected services and resources.

<p>True (A)</p> Signup and view all the answers

In a DoS attack, rapid and continuous online requests are sent to a target server to overload the server's bandwidth.

<p>True (A)</p> Signup and view all the answers

A distributed denial of service (DDoS) attack is a common type of DoS attack.

<p>True (A)</p> Signup and view all the answers

Unlike most cyberattacks initiated to steal sensitive information, initial DDoS attacks are launched to make websites inaccessible to their users.

<p>True (A)</p> Signup and view all the answers

DDoS attacks can serve as a facade for other malicious acts.

<p>True (A)</p> Signup and view all the answers

Flashcards

Computer Security

The protection of computer systems and information from harm, theft, and unauthorized use.

Cybersecurity

The practice of protecting computer systems from malicious attacks, including viruses, worms and cybercriminals.

Network Security

The practice of securing a computer network from intruders, like hackers or malicious software.

Application Security

Ensuring software and devices are free from vulnerabilities and threats that could expose data and system vulnerabilities.

Signup and view all the flashcards

Information Security

The practice of safeguarding the integrity and privacy of data, both while stored and during transmission.

Signup and view all the flashcards

Operational Security

Processes and decisions for handling and protecting data assets, including user permissions and data storage procedures.

Signup and view all the flashcards

Disaster Recovery

Plans for an organization to recover from cyberattacks or other events that disrupt operations or data.

Signup and view all the flashcards

Business Continuity

A plan that allows an organization to continue operating without certain resources in case of a disaster or disruption.

Signup and view all the flashcards

End-user Education

Training users on good security practices to prevent them from accidentally introducing threats to a system.

Signup and view all the flashcards

Confidentiality

Ensuring that information is only accessible to authorized individuals.

Signup and view all the flashcards

Integrity

Protecting information from unauthorized modification or alteration.

Signup and view all the flashcards

Availability

Making sure that authorized users can easily access the information they need, when they need it.

Signup and view all the flashcards

Anti-virus Software

Software designed to detect and remove malicious programs, such as viruses and worms.

Signup and view all the flashcards

Password

A unique combination of characters that grants access to an account or system.

Signup and view all the flashcards

Log off Public Computers

Logging out of public computers to prevent unauthorized access to your accounts or data.

Signup and view all the flashcards

Saving and Backing Up

Saving and creating backups of important files to protect them from loss or corruption.

Signup and view all the flashcards

Limit Social Network Information

Limiting the amount of personal information shared online to reduce the risk of identity theft and other security breaches.

Signup and view all the flashcards

Download Files Legally

Downloading files from legitimate sources to avoid accidentally installing malware or potentially harmful software.

Signup and view all the flashcards

Keep Personal Information Safe

Not sharing personal information online with unknown or untrusted sources, such as in phishing emails

Signup and view all the flashcards

Lock Your Computer

Locking your computer when unattended to prevent unauthorized access

Signup and view all the flashcards

Avoid Suspicious Links

Avoiding suspicious links or pop-up notifications that could lead to malware infection

Signup and view all the flashcards

Keep Applications Up to Date

Keeping all software applications updated to patch security vulnerabilities and protect against malware.

Signup and view all the flashcards

Firewall

A network security device that acts as a gatekeeper, controlling incoming and outgoing network traffic based on defined security rules.

Signup and view all the flashcards

Hacker

A person who exploits vulnerabilities in computer systems for various reasons, including stealing data, causing damage or disrupting service.

Signup and view all the flashcards

Threat

Anything that can compromise the confidentiality, integrity or availability of an information system.

Signup and view all the flashcards

Vulnerability

A weakness in an IT infrastructure that can be exploited by hackers to gain unauthorized access.

Signup and view all the flashcards

Malware

Malicious software designed to infect computers and perform harmful activities without the user's knowledge.

Signup and view all the flashcards

Ransomware

A type of malware that encrypts a victim's files and demands a ransom payment to decrypt them.

Signup and view all the flashcards

Virus

A type of malware that infects files and replicates itself, spreading to other programs and systems.

Signup and view all the flashcards

Worm

A type of malware that replicates itself and spreads across networks, often exploiting vulnerabilities in systems.

Signup and view all the flashcards

Trojan Horse

A type of malware disguised as legitimate software, but contains malicious code that can harm a computer.

Signup and view all the flashcards

Bot

An automated program that interacts with network services, often used for malicious activities.

Signup and view all the flashcards

Study Notes

Computer and Cybersecurity

  • Computer Security: Protecting computer systems and information from harm, theft, and unauthorized use. Hardware protection uses standard security measures like serial numbers, locks, and alarms. Protecting information and system access uses more complex tactics.

  • Cybersecurity: Protecting computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks. Also known as information technology security or electronic information security. It encompasses a broad range of contexts, from business to mobile computing.

Common Security Categories

  • Network Security: Securing computer networks from intruders, whether targeted attackers or opportunistic malware.

  • Application Security: Keeping software and devices free of threats. A compromised application can provide access to sensitive data. Successful security begins in the design stage, before deployment.

  • Information Security: Protecting the integrity and privacy of data, both in storage and transit.

  • Operational Security: Includes the processes and decisions for handling and protecting data assets. Access permissions and procedures for data storage and sharing fall under this category.

  • Disaster Recovery and Business Continuity: Defining how an organization responds to cybersecurity incidents or events causing operational or data loss. This includes restoring operations and information to their pre-incident state. This involves policies that dictate recovery steps.

  • End-User Education: Critical to mitigate the unpredictable human factor in cybersecurity. Includes teaching users to avoid suspicious emails, attachments, or links. Important to educate users on the vital role they play in maintaining security.

CIA Triad

  • Confidentiality: Ensuring information is accessible only to the intended audience.

  • Integrity: Protecting information from unauthorized modification.

  • Availability: Ensuring information is readily accessible to authorized users when needed.

Good Security Practices for Individuals

  • Install Antivirus and Anti-malware Software: Verify the software legitimacy to minimize vulnerabilities, keep updated.

  • Use Strong Passwords: Avoid reusing passwords across multiple accounts and websites. Change passwords on a schedule for better security, and avoid saving them on insecure sites.

  • Log off Public Computers: Public computers are susceptible to malware, so log out completely after use.

  • Save and Back up Data: Implement regular data backups to protect against inevitable events like hardware failure or virus infection. Validate backup files to ensure they can be easily restored.

  • Limit Social Network Information: Be cautious about personal information shared online. Use privacy and security settings to protect yourself and personal information.

  • Download Files Legally: Avoid peer-to-peer (P2P) networks and file-sharing clients.

  • Keep Personal Information Safe: Avoid clicking on suspicious links or divulging information online if unsure of the sender or website. Be wary of phishing attempts which try to trick users.

  • Lock Your Computer: Lock devices when unattended to maintain security.

  • Keep Applications Up-to-Date: Enable automatic updates or manually ensure all applications are current to mitigate vulnerabilities.

Malware

  • Malware: A general term to describe various malicious software. These softwares are unwanted and potentially dangerous.

  • Different types of Malware: Ransomware, Spyware, Adware, Worms, Trojans, Botnets, Viruses.

  • Software Bugs vs Malicious Activities: Understanding that software errors (bugs) differ from the intentional actions of malware.

Distribution Channels for Malware

  • Download: Unintended downloads from the internet.

  • Unsolicited Email: Unwanted attachments or embedded links.

  • Physical Media: Integrated or removable media (thumb drives).

  • Self-Propagation: Malware's ability to spread from computer to computer.

Common Computer Fraud Techniques

  • Phishing: Spoofed emails that appear to come from legitimate companies, tricking users into revealing information on fake Websites. Attackers also use fraudulent texts and voicemails to collect sensitive data. Examples of actions include clicking on attachments, enabling macros in documents, updating passwords, and connecting to new Wi-Fi hotspots.

  • Denial-of-Service (DoS) Attacks: Overloading a service or website or servers with traffic to make it unusable, or very slow.

  • Distributed Denial-of-Service (DDoS) Attacks: Similar to DoS, but using multiple compromised systems to overwhelm the target, making it very hard to defend against.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Dive into the essentials of computer and cybersecurity, examining key concepts such as computer security, cybersecurity, and various security categories. This quiz will enhance your understanding of how to protect systems from threats and malicious attacks. Test your knowledge about network security, application security, and information security.

More Like This

Computer and Network Security
5 questions

Computer and Network Security

HeavenlyStarlitSky3474 avatar
HeavenlyStarlitSky3474
Computer Security Fundamentals
5 questions
Computer Security Risks
11 questions
CO1201 Computer Security Quiz
38 questions
Use Quizgecko on...
Browser
Browser