Computer and Cybersecurity Overview
18 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of a firewall?

A firewall is a network security device that monitors incoming and outgoing network traffic. It then decides whether to allow or block specific traffic based on a defined set of security rules.

What are some examples of malicious activities that hackers might engage in?

Hackers may engage in malicious activities such as installing malware, stealing or destroying data, disrupting service, or attempting to gain unauthorized access to sensitive information.

What are the three principles of the CIA Triad in information security?

The three principles of the CIA Triad are confidentiality, integrity, and availability.

Which of the following is NOT a good security practice for individuals?

<p>Sharing your online passwords with friends (D)</p> Signup and view all the answers

Logging off of public computers is unnecessary if you are just briefly using them.

<p>False (B)</p> Signup and view all the answers

It's safe to open email attachments from unknown senders if you scan them for viruses first.

<p>False (B)</p> Signup and view all the answers

Which of these represents a common computer fraud technique?

<p>All of the above (D)</p> Signup and view all the answers

What happens when a victim falls prey to a phishing attack?

<p>A phishing attack involves a victim acting on a fraudulent email that demands urgent action. This can lead to the victim clicking on malicious links, enabling macros, or providing sensitive information, ultimately compromising their security.</p> Signup and view all the answers

What is the main goal of a denial of service (DoS) attack?

<p>To shut down a website or network service (B)</p> Signup and view all the answers

Distributed denial-of-service (DDoS) attacks are a more potent form of DoS attacks, as they use multiple computers to flood the target.

<p>True (A)</p> Signup and view all the answers

What are some examples of recent DDoS attacks?

<p>Recent DDoS attacks have targeted Amazon Web Services (AWS), a cloud computing platform, and Dyn, a domain name system (DNS) provider. These attacks caused widespread outages, affecting numerous websites and services.</p> Signup and view all the answers

What is the primary function of a computer worm?

<p>To self-replicate and spread across computers (A)</p> Signup and view all the answers

How does ransomware differ from a virus?

<p>Ransomware aims to extort money by encrypting users' files and demanding payment to decrypt them. This differs from viruses, which focus on replicating and spreading to infect other files, often without the primary goal of financial gain.</p> Signup and view all the answers

Spyware is designed to replicate itself and embed into other files on the device, similar to a virus.

<p>False (B)</p> Signup and view all the answers

A botnet is a network of compromised devices that can be controlled by an attacker.

<p>True (A)</p> Signup and view all the answers

What are some common distribution channels for malware?

<p>Malware can be distributed through various channels, including unintentional downloads, unsolicited email attachments or links, physical media, and self-propagation.</p> Signup and view all the answers

A ______ is a form of social engineering where attackers attempt to trick victims into providing sensitive information by posing as a legitimate entity.

<p>phishing</p> Signup and view all the answers

What are two reasons attackers might launch a denial-of-service (DoS) attack?

<p>Attackers launch DoS attacks to make websites inaccessible to their users or disrupt services to achieve other malicious objectives, such as stealing sensitive information or creating chaos.</p> Signup and view all the answers

Flashcards

Computer security

The protection of computer systems and information from harm, theft, and unauthorized use.

Cybersecurity

The practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.

Network security

Securing a computer network from intruders, whether targeted attackers or malware.

Application security

Keeping software and devices free of threats, ensuring they don't provide access to protected data.

Signup and view all the flashcards

Information security

Protecting the integrity and privacy of data, both in storage and in transit.

Signup and view all the flashcards

Operational security

Includes processes and decisions for handling and protecting data assets, like user permissions and data storage procedures.

Signup and view all the flashcards

Disaster recovery

Defines how an organization recovers from a cyber-security incident or any event that causes loss of operations or data.

Signup and view all the flashcards

Business continuity

The plan an organization uses to continue operating without certain resources.

Signup and view all the flashcards

End-user education

Educating users to avoid accidental threats by following good security practices.

Signup and view all the flashcards

CIA Triad

The goal of information security which follows three main principles: confidentiality, integrity, and availability.

Signup and view all the flashcards

Confidentiality

Ensuring that information is available only to the intended audience.

Signup and view all the flashcards

Integrity

Protecting information from being modified by unauthorized parties.

Signup and view all the flashcards

Availability

Ensuring that information is readily accessible when needed.

Signup and view all the flashcards

Anti-virus and anti-malware software

Software designed to protect against viruses and other malicious software.

Signup and view all the flashcards

Strong password

A unique and strong combination of characters for accessing an account or system.

Signup and view all the flashcards

Log off public computers

Completely logging out of a public computer after use to prevent security risks.

Signup and view all the flashcards

Save and backup

Regularly saving files and backing up important data in case of unforeseen events.

Signup and view all the flashcards

Limit social network information

Being cautious about personal information shared on social media platforms.

Signup and view all the flashcards

Download files legally

Downloading files only from trusted and legal sources.

Signup and view all the flashcards

Keep personal information safe

Protecting personal information like online banking details and passwords from unauthorized access.

Signup and view all the flashcards

Lock your computer

Locking your computer when leaving it unattended to prevent unauthorized access.

Signup and view all the flashcards

Do not click on suspicious links or pop-up notifications

Avoiding clicking on suspicious links or pop-up notifications that could lead to malware.

Signup and view all the flashcards

Keep applications up to date

Ensuring all applications are updated to the latest version to patch security vulnerabilities.

Signup and view all the flashcards

Firewall

A network security device that monitors and controls incoming and outgoing network traffic based on defined rules.

Signup and view all the flashcards

Hackers

An individual who breaks into computer systems, often with malicious intent.

Signup and view all the flashcards

Threats

Anything that can compromise the confidentiality, integrity, or availability of an information system.

Signup and view all the flashcards

Vulnerability

A weakness in the IT infrastructure that hackers can exploit for unauthorized access.

Signup and view all the flashcards

Malware

A collective term for malicious software designed to harm computers.

Signup and view all the flashcards

Ransomware

A type of malware that encrypts files and demands a ransom payment for decryption.

Signup and view all the flashcards

Virus

A type of malware that spreads by infecting files and replicating itself within the computer.

Signup and view all the flashcards

Worm

A type of malware that self-replicates and spreads over a network, infecting multiple systems.

Signup and view all the flashcards

Trojan horse

A type of malware that disguises itself as legitimate software to gain access and perform malicious actions.

Signup and view all the flashcards

Bots

An automated process that interacts with network services, often used for malicious purposes.

Signup and view all the flashcards

Botnet

A network of compromised devices controlled by a hacker for malicious purposes.

Signup and view all the flashcards

Phishing

An email that appears legitimate but is designed to trick users into revealing personal information or installing malware.

Signup and view all the flashcards

Denial of Service (DoS) attack

A type of attack that overloads a server or network with traffic, making it unavailable to legitimate users.

Signup and view all the flashcards

Distributed Denial of Service (DDoS) attack

A type of DoS attack where multiple compromised devices work together to overload a target.

Signup and view all the flashcards

Study Notes

Computer and Cybersecurity

  • Computer Security: Protecting computer systems and information from harm, theft, and unauthorized use. Hardware typically protected using serial numbers, locks, and alarms. Protecting access to information uses various tactics.
  • Cybersecurity: The practice of defending computers, servers, and devices from malicious attacks. Also known as information technology security or electronic information security.
  • Categories of Security:
    • Network Security: Securing computer networks from intruders (targeted or opportunistic malware).
    • Application Security: Keeping software and devices free of threats; crucial in the initial design phase.
    • Information Security: Protecting data integrity and privacy, both during storage and transmission.
    • Operational Security: Processes and decisions for handling and securing data assets, including user permissions and data storage/sharing procedures.
    • Disaster Recovery and Business Continuity: Defining how an organization responds to a cyber-security incident, restoring operations and information to pre-incident levels.
    • End-User Education: Focusing on people as the weakest link in security, teaching safe practices like deleting suspicious email attachments, avoiding unsecured USB drives, and being cautious of unknown websites and downloads.

CIA Triad

  • Confidentiality: Ensuring information is available only to the intended audience.
  • Integrity: Protecting information from unauthorized modification.
  • Availability: Ensuring information is readily accessible when needed to perform job duties.

Good Security Practices for Individuals

  • Install Anti-Virus and Anti-Malware Software: Verify software legitimacy and keep the software up to date.
  • Use Strong Passwords: Avoid reusing passwords and change them regularly. Do not save passwords on unsecure devices or websites.
  • Log Off Public Computers: Be aware of the security vulnerabilities of using public computers and log off completely when finished.
  • Save and Back Up Data: Back up important information regularly, and verify that saved files can be easily restored.
  • Limit Social Network Information: Be cautious about personal information shared on social media, and utilize privacy and security settings appropriately.
  • Download Files Legally: Avoid peer-to-peer networks and only download from trusted sources to avoid malware.

Malware

  • Definition: A collective term for malicious software and programs that perform malicious activities, causing harm to computers.
  • Malware Types:
    • Ransomware: Threatens to publish or block data access unless a ransom is paid. Can use encryption to render files inaccessible.
    • Spyware: Steals data from a victim's computer.
    • Adware: Displays unwanted ads.
    • Worms: Self-replicating malware that spreads through a network without requiring a host.
    • Trojans: Disguised malware that seems legitimate, sneaking malicious code/programs onto your device.
    • Botnets: Turn infected devices into a network of bots (zombie computers), controlled by a central server.
    • Virus: Infects files by inserting malicious code. Usually requires the user to run an infected program for execution.

Distribution Channels for Malware

  • Download: Unintentional download of malicious software.
  • Unsolicited Email: Receiving unwanted attachments/links.
  • Physical Media: Using infected physical media (e.g., thumb drives).
  • Self-Propagation: Malware's ability to spread on its own to other devices or networks.

Common Computer Fraud Techniques

  • Phishing: Sending spoofed emails that appear to be from legitimate companies to trick recipients into providing information (e.g., passwords, credit card details).
  • Denial of Service (DoS) attacks: Overloading a server or network with traffic, making it inaccessible to legitimate users.
  • Distributed Denial of Service (DDoS) attacks: Coordinated DoS attacks launched from multiple computers.
  • Hacking: Breaking into a computer system for various reasons (e.g., stealing data or disrupting services), sometimes with ethical purposes (like identifying vulnerabilities).

Additional Terms

  • Firewall: A network security device that monitors incoming and outgoing network traffic, deciding whether to allow or block traffic based on defined security rules.
  • Vulnerability: Any weakness in a computer system that a hacker can exploit to gain unauthorized access to data.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

Description

Dive into the essentials of computer security and cybersecurity. This quiz covers various aspects including network security, application security, and information security. Test your knowledge on how to protect systems and data from threats and unauthorized access.

More Like This

Computer Security Introduction
69 questions
Computer Study Notes: Cybersecurity
10 questions
Computer Security Fundamentals
5 questions
Computer Security Fundamentals
40 questions
Use Quizgecko on...
Browser
Browser