Computer and Cybersecurity Overview
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a firewall?

A firewall is a network security device that monitors incoming and outgoing network traffic. It then decides whether to allow or block specific traffic based on a defined set of security rules.

What are some examples of malicious activities that hackers might engage in?

Hackers may engage in malicious activities such as installing malware, stealing or destroying data, disrupting service, or attempting to gain unauthorized access to sensitive information.

What are the three principles of the CIA Triad in information security?

The three principles of the CIA Triad are confidentiality, integrity, and availability.

Which of the following is NOT a good security practice for individuals?

<p>Sharing your online passwords with friends</p> Signup and view all the answers

Logging off of public computers is unnecessary if you are just briefly using them.

<p>False</p> Signup and view all the answers

It's safe to open email attachments from unknown senders if you scan them for viruses first.

<p>False</p> Signup and view all the answers

Which of these represents a common computer fraud technique?

<p>All of the above</p> Signup and view all the answers

What happens when a victim falls prey to a phishing attack?

<p>A phishing attack involves a victim acting on a fraudulent email that demands urgent action. This can lead to the victim clicking on malicious links, enabling macros, or providing sensitive information, ultimately compromising their security.</p> Signup and view all the answers

What is the main goal of a denial of service (DoS) attack?

<p>To shut down a website or network service</p> Signup and view all the answers

Distributed denial-of-service (DDoS) attacks are a more potent form of DoS attacks, as they use multiple computers to flood the target.

<p>True</p> Signup and view all the answers

What are some examples of recent DDoS attacks?

<p>Recent DDoS attacks have targeted Amazon Web Services (AWS), a cloud computing platform, and Dyn, a domain name system (DNS) provider. These attacks caused widespread outages, affecting numerous websites and services.</p> Signup and view all the answers

What is the primary function of a computer worm?

<p>To self-replicate and spread across computers</p> Signup and view all the answers

How does ransomware differ from a virus?

<p>Ransomware aims to extort money by encrypting users' files and demanding payment to decrypt them. This differs from viruses, which focus on replicating and spreading to infect other files, often without the primary goal of financial gain.</p> Signup and view all the answers

Spyware is designed to replicate itself and embed into other files on the device, similar to a virus.

<p>False</p> Signup and view all the answers

A botnet is a network of compromised devices that can be controlled by an attacker.

<p>True</p> Signup and view all the answers

What are some common distribution channels for malware?

<p>Malware can be distributed through various channels, including unintentional downloads, unsolicited email attachments or links, physical media, and self-propagation.</p> Signup and view all the answers

A ______ is a form of social engineering where attackers attempt to trick victims into providing sensitive information by posing as a legitimate entity.

<p>phishing</p> Signup and view all the answers

What are two reasons attackers might launch a denial-of-service (DoS) attack?

<p>Attackers launch DoS attacks to make websites inaccessible to their users or disrupt services to achieve other malicious objectives, such as stealing sensitive information or creating chaos.</p> Signup and view all the answers

Study Notes

Computer and Cybersecurity

  • Computer Security: Protecting computer systems and information from harm, theft, and unauthorized use. Hardware typically protected using serial numbers, locks, and alarms. Protecting access to information uses various tactics.
  • Cybersecurity: The practice of defending computers, servers, and devices from malicious attacks. Also known as information technology security or electronic information security.
  • Categories of Security:
    • Network Security: Securing computer networks from intruders (targeted or opportunistic malware).
    • Application Security: Keeping software and devices free of threats; crucial in the initial design phase.
    • Information Security: Protecting data integrity and privacy, both during storage and transmission.
    • Operational Security: Processes and decisions for handling and securing data assets, including user permissions and data storage/sharing procedures.
    • Disaster Recovery and Business Continuity: Defining how an organization responds to a cyber-security incident, restoring operations and information to pre-incident levels.
    • End-User Education: Focusing on people as the weakest link in security, teaching safe practices like deleting suspicious email attachments, avoiding unsecured USB drives, and being cautious of unknown websites and downloads.

CIA Triad

  • Confidentiality: Ensuring information is available only to the intended audience.
  • Integrity: Protecting information from unauthorized modification.
  • Availability: Ensuring information is readily accessible when needed to perform job duties.

Good Security Practices for Individuals

  • Install Anti-Virus and Anti-Malware Software: Verify software legitimacy and keep the software up to date.
  • Use Strong Passwords: Avoid reusing passwords and change them regularly. Do not save passwords on unsecure devices or websites.
  • Log Off Public Computers: Be aware of the security vulnerabilities of using public computers and log off completely when finished.
  • Save and Back Up Data: Back up important information regularly, and verify that saved files can be easily restored.
  • Limit Social Network Information: Be cautious about personal information shared on social media, and utilize privacy and security settings appropriately.
  • Download Files Legally: Avoid peer-to-peer networks and only download from trusted sources to avoid malware.

Malware

  • Definition: A collective term for malicious software and programs that perform malicious activities, causing harm to computers.
  • Malware Types:
    • Ransomware: Threatens to publish or block data access unless a ransom is paid. Can use encryption to render files inaccessible.
    • Spyware: Steals data from a victim's computer.
    • Adware: Displays unwanted ads.
    • Worms: Self-replicating malware that spreads through a network without requiring a host.
    • Trojans: Disguised malware that seems legitimate, sneaking malicious code/programs onto your device.
    • Botnets: Turn infected devices into a network of bots (zombie computers), controlled by a central server.
    • Virus: Infects files by inserting malicious code. Usually requires the user to run an infected program for execution.

Distribution Channels for Malware

  • Download: Unintentional download of malicious software.
  • Unsolicited Email: Receiving unwanted attachments/links.
  • Physical Media: Using infected physical media (e.g., thumb drives).
  • Self-Propagation: Malware's ability to spread on its own to other devices or networks.

Common Computer Fraud Techniques

  • Phishing: Sending spoofed emails that appear to be from legitimate companies to trick recipients into providing information (e.g., passwords, credit card details).
  • Denial of Service (DoS) attacks: Overloading a server or network with traffic, making it inaccessible to legitimate users.
  • Distributed Denial of Service (DDoS) attacks: Coordinated DoS attacks launched from multiple computers.
  • Hacking: Breaking into a computer system for various reasons (e.g., stealing data or disrupting services), sometimes with ethical purposes (like identifying vulnerabilities).

Additional Terms

  • Firewall: A network security device that monitors incoming and outgoing network traffic, deciding whether to allow or block traffic based on defined security rules.
  • Vulnerability: Any weakness in a computer system that a hacker can exploit to gain unauthorized access to data.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Dive into the essentials of computer security and cybersecurity. This quiz covers various aspects including network security, application security, and information security. Test your knowledge on how to protect systems and data from threats and unauthorized access.

More Like This

Computer Security Quiz
10 questions

Computer Security Quiz

ThumbsUpFantasy avatar
ThumbsUpFantasy
Computer Security Introduction
69 questions
Computer Security Fundamentals
5 questions
Computer Security Fundamentals
40 questions
Use Quizgecko on...
Browser
Browser