Untitled Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should you do if an antivirus program flags an e-mail attachment as infected?

  • Delete the attachment immediately (correct)
  • Open the attachment to assess the issue
  • Ignore the alert from the antivirus program
  • Forward the attachment to someone else
  • How does IP spoofing affect network security?

  • It allows an intruder to masquerade as a trusted source (correct)
  • It blocks unauthorized access from external IP addresses
  • It strengthens network security by verifying user identity
  • It ensures that all transmissions are encrypted
  • What is the primary function of a personal firewall utility?

  • To store personal data securely
  • To protect the computer from unauthorized intrusions (correct)
  • To provide internet access at higher speeds
  • To manage user passwords effectively
  • What is a key characteristic of a denial of service attack?

    <p>It disrupts access to an internet service</p> Signup and view all the answers

    What is the purpose of installing antivirus software on all your computers?

    <p>To detect and remove viruses, worms, or Trojans</p> Signup and view all the answers

    Which of the following describes a back door in software?

    <p>A way to access the software without normal authentication</p> Signup and view all the answers

    What is a common consequence of not using a personal firewall?

    <p>Vulnerability to unauthorized intrusions</p> Signup and view all the answers

    What is the function of a firewall?

    <p>To prevent unauthorized intrusion to a network</p> Signup and view all the answers

    What is the primary function of intrusion detection software?

    <p>To analyze network traffic and identify suspicious behavior</p> Signup and view all the answers

    What is a biometric device used for?

    <p>To authenticate a person's identity using personal characteristics</p> Signup and view all the answers

    What does access control specifically define?

    <p>The users who can access a computer and their permissions</p> Signup and view all the answers

    Which method can help enhance password security?

    <p>Using longer passwords with a mix of characters</p> Signup and view all the answers

    What is a possessed object in the context of computer security?

    <p>An item someone must carry to gain access</p> Signup and view all the answers

    What describes hardware vandalism?

    <p>Defacing or destroying computer equipment</p> Signup and view all the answers

    What is software theft?

    <p>Illegally copying or stealing software</p> Signup and view all the answers

    What does a single-user license agreement allow?

    <p>Backup and resale after use</p> Signup and view all the answers

    What is a computer security risk?

    <p>Action that causes loss of or damage to a computer system</p> Signup and view all the answers

    Which of the following describes a virus?

    <p>A program that replicates itself and uses up computer resources</p> Signup and view all the answers

    What is the main method through which a virus spreads via email messages?

    <p>By hiding in a Word document attached to an email</p> Signup and view all the answers

    What is the primary effect of a Trojan horse on a computer system?

    <p>It hides within legitimate software or files.</p> Signup and view all the answers

    How do worms differ from viruses?

    <p>Worms can replicate themselves across networks, whereas viruses cannot.</p> Signup and view all the answers

    Which of the following is NOT a technique to safeguard against Internet and network attacks?

    <p>Disabling firewall protections</p> Signup and view all the answers

    Which concept refers to the right of individuals to keep their information private and secure?

    <p>Privacy rights</p> Signup and view all the answers

    What is a potential health-related disorder connected to excessive computer use?

    <p>Repetitive strain injuries</p> Signup and view all the answers

    What is the primary function of a surge protector?

    <p>To safeguard equipment from electrical power disturbances</p> Signup and view all the answers

    Which type of backup involves creating copies of all files in a computer?

    <p>Full backup</p> Signup and view all the answers

    What is the recommended method to ensure the security of a wireless access point?

    <p>Enable Wi-Fi Protected Access (WPA)</p> Signup and view all the answers

    Which of the following best describes a backup?

    <p>A duplicate of files, programs, or disks</p> Signup and view all the answers

    What can cause prolonged malfunction of a computer?

    <p>Faulty hardware or natural disasters</p> Signup and view all the answers

    What do codes of conduct in IT primarily address?

    <p>Ethical usage of computers and information systems</p> Signup and view all the answers

    What is the effect of an undervoltage condition?

    <p>A drop in electrical supply</p> Signup and view all the answers

    What rights are granted by intellectual property laws?

    <p>Legal protection for creators of original work</p> Signup and view all the answers

    What is the primary purpose of a cookie?

    <p>To store user preferences and data</p> Signup and view all the answers

    Which of the following best describes spyware?

    <p>A program installed without the user's knowledge</p> Signup and view all the answers

    What is the main function of anti-spam programs?

    <p>To attempt to remove spam messages from inboxes</p> Signup and view all the answers

    What is phishing primarily aimed at achieving?

    <p>To obtain personal and financial information</p> Signup and view all the answers

    When might users choose to disable cookies?

    <p>When they wish to maintain their privacy online</p> Signup and view all the answers

    What does adware primarily do?

    <p>It displays online advertisements to users</p> Signup and view all the answers

    How can users effectively manage spam emails?

    <p>By using email filtering services</p> Signup and view all the answers

    Which of the following describes content filtering?

    <p>A method to block certain types of internet content</p> Signup and view all the answers

    What is the main focus of computer forensics?

    <p>Discovery, collection, and analysis of evidence</p> Signup and view all the answers

    Which condition is commonly associated with excessive computer use?

    <p>Computer vision syndrome (CVS)</p> Signup and view all the answers

    What does the Internet Content Rating Association (ICRA) provide?

    <p>A rating system for Web content</p> Signup and view all the answers

    Which method helps prevent tendonitis or carpal tunnel syndrome?

    <p>Dangle arms loosely at sides and shake arms and hands</p> Signup and view all the answers

    What is an important aspect of ergonomics?

    <p>Adjustable height for chairs</p> Signup and view all the answers

    What is green computing primarily concerned with?

    <p>Reducing electricity and environmental waste</p> Signup and view all the answers

    What common health issue involving vision is related to prolonged computer screen use?

    <p>Computer vision syndrome (CVS)</p> Signup and view all the answers

    Which of the following is NOT a precaution to prevent computer-related injuries?

    <p>Keep wrists angled downward while typing</p> Signup and view all the answers

    Study Notes

    Introduction to Computing - Module 8

    • Module 8 covers Computer Security, Ethics, and Privacy.

    Objectives

    • Explain computer security risks and types of cybercrime perpetrators.
    • Describe various internet and network attacks, and ways to safeguard against them.
    • Discuss techniques for preventing unauthorized computer access and use.
    • Discuss preventing health-related disorders and injuries from computer use.
    • Discuss issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.

    Computer Security Risks

    • Computer security risks are actions that cause loss or damage to the computer system.

    Computer Viruses, Worms, and Trojan Horses

    • Virus: A potentially damaging computer program that can spread and damage files.

    • Worm: Copies itself repeatedly, using up resources, potentially shutting down a computer or network.

    • Trojan Horse: Hides within or looks legitimate but triggers harmful events or actions after initial execution.

    • Payload: Destructive event triggered when opening a file, running a program, or booting with an infected disk.

    • Viruses can spread through e-mail messages:

    • Unscrupulous programmers create a virus program, hiding it in a Word document, attaching the Word document to an e-mail.

    • Some users that open the attachment become infected.

    • Other users, who do not recognize the sender and open the e-mail message, are not infected.

    • The virus is then sent to thousands of users.

    • Preventing Macro Viruses:

    • Set macro security level in applications.

    • Macros are disabled by default, notifications will show when documents contain macros.

    • Macros act as a small program that automates common tasks.

    • Antivirus programs:

    • Identify and remove computer viruses.

    • Usually protect against worms and Trojan horses.

    • Virus Signature:

    • Specific pattern of virus code.

    • Also called virus definition.

    • Antivirus programs look for virus signatures.

    How does an Antivirus Program Inoculate a Program File?

    • Records program info (size, creation date).
    • Detects if virus tampers with files.
    • Keeps infected files in separate area of hard disk to prevent further damage.
    • Attempts to remove detected viruses.

    Tips for Preventing Virus, Worm, and Trojan Horse Infections

    • Set macro security in programs, enabling or disabling macros as needed.
    • Install antivirus programs on all computers.
    • Never open e-mail attachments unless expecting from a trusted source.
    • Check all downloaded programs for viruses, worms, and/or Trojan horses.
    • Install a personal firewall.
    • If an attachment is identified as infected, immediately delete it.

    Denial of Service Attack and Back Door

    • Denial of Service Attack: An assault disrupting computer access to internet services like the Web or e-mail.
    • Back Door: A program or set of instructions in a program that bypasses security controls to access a computer resource.

    Spoofing

    • IP spoofing occurs when an intruder computer fools a network into believing its IP address is from a trusted source.
    • Perpetrators trick their victims to interact with a fake website.

    Firewall

    • Security system (hardware and/or software) that prevents unauthorized intrusions.

    Personal Firewall Utility

    • A program that protects a personal computer's data from unauthorized intrusions.
    • Monitors transmissions to and from the computer.
    • Informs the user of attempted intrusions.

    Unauthorized Access and Use

    • Intrusion Detection Software: Analyzes network traffic, assesses system vulnerabilities, and identifies suspicious behavior.
    • Access Control: Defines who can access a computer and what actions they can take.
    • Audit Trail Records: Documents access attempts.
    • Disabling File and Printer Sharing: Prevents unauthorized access to your computer through the internet.
    • Usernames: Unique combinations of characters identifying a user.
    • Passwords: Private combinations of characters associated with the username, enabling computer access to resources.
    • Password protection: Longer passwords provide greater security, increasing the time it takes to discover them (provided appropriate character combinations are used).
    • Possessed Objects: Items a user must carry to access a computer or facility (e.g., ATM card, ID card).
    • Biometric devices: Authenticate person's identity using personal characteristics like fingerprints, hand geometry, voice, signature, and iris.

    Hardware Theft and Vandalism

    • Hardware Theft: Stealing computer equipment.
    • Hardware Vandalism: Defacing or destroying computer equipment.
    • Methods to protect from theft: Cables and locking mechanisms.
    • Security Methods: Passwords, possessed objects, biometrics for various devices (PDAs/phones).

    Software Theft

    • Software Theft: Stealing or illegally copying software, or intentionally erasing programs.
    • Software Piracy: Illegal duplication of copyrighted software.
    • License Agreements: Grants right to use software on a specific computer, prohibiting copying and selling.

    Safeguarding Software Theft

    • Product Activation: Allowing users to input product identification numbers online or by phone to receive unique installation ID numbers.
    • Business Software Alliance (BSA): Promote the awareness of software piracy problems resulting from unauthorized copying without licensing.

    Information Theft

    • Encryption: Converting readable data (plaintext) into unreadable characters (ciphertext) to protect from theft.
    • Encryption methods often use multiple methods.
    • Encryption key: Formula for decryption (deciphering).
    • Encrypting Files/Folders in Windows: Locate the file/folder, right-click, select Properties, navigate to the General tab and click Advanced, select Encrypt content to secure data.

    Internet Security Risks

    • Encryption: Web browsers use encryption to transmit data securely. Websites beginning with "https" typically use encryption to help secure connections.
    • Digital Certificates: Confirm website legitimacy, ensuring secure connections.
    • Certificate Authority (CA): Authorized individuals/companies that issue and verify digital certificates.

    Secure Socket Layer (SSL)

    • Encrypts data transferred between client systems (e.g., web browser) and the internet server.
    • "https" in web addresses indicates secure connections.

    System Failure

    • System Failure: Prolonged malfunction of a computer, caused by factors like aging hardware, natural disasters, and electrical problems (e.g., power surges or outages).
    • Surge protector: Protects computer equipment from electrical disturbances.
    • Uninterruptible power supply (UPS): A surge protector that continues providing power during electrical power loss.

    Backing Up

    • Backup: Duplicates of files (programs/discs) to restore files after system failure/corrupted files. Includes full and selective backups, as well as multiple copies for redundancy (e.g., three generation backups).

    Wireless Security

    • Secure your Wireless Access Point (WAP) and do not broadcast the network name.
    • Enable WPA (Wired Equivalent Privacy/Wi-Fi Protected Access)

    Health Concerns of Computer Use

    • Computer Vision Syndrome (CVS): Eye and vision problems

    • Repetitive Strain Injury (RSI): Strain on tendons/muscles due to repeated motions

    • Carpal Tunnel Syndrome (CTS): Inflammation of the nerve that connects the forearm to the palm, resulting from repeated motions

    • Computer Addiction: When computer use dominates a person's entire social life.

    • Preventing RSI/CTS: Spread fingers apart, keeping wrists straight, gently push back fingers/thumb, and dangle arms loosely, then shake arms.

    • Easing Eyestrain: Taking frequent breaks (every 10-15 minutes) looking into the distance, blinking regularly, and positioning the display at eye level.

    • Ergonomics: Applied science focusing on comfort, efficiency, and safety in the workplace (e.g., proper posture, adjusting chair, desk).

    • Green Computing: Reducing electricity and environmental waste during computer use.

    • Use ENERGY STAR compliant devices and peripherals

    • Avoid turning the computer off/on multiple times during the day, and only shutting down when not in use.

    • Use paperless methods for communications

    • Recycle old computers, paper, toner cartridges.

    • Telecommute or walk to cut down on car emissions

    Additional Information (Ethics and Society)

    • Computer Ethics: Moral guidelines for computer and information systems use (e.g., avoiding harm to other people and software theft). This includes consideration of unauthorized use of computer systems & networks, intellectual property rights, codes of conduct, accuracy of information, and information privacy.

    • IT Code of Conduct: Written guidelines for employee computer use.

    • Information Privacy: The right of individuals/companies to control personal information, including ways to protect it, such as the use of electronic profiles, cookies, controls against spam and phishing, content filtering systems, and computer forensics.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    18 questions

    Untitled Quiz

    RighteousIguana avatar
    RighteousIguana
    Untitled Quiz
    50 questions

    Untitled Quiz

    JoyousSulfur avatar
    JoyousSulfur
    Untitled Quiz
    48 questions

    Untitled Quiz

    StraightforwardStatueOfLiberty avatar
    StraightforwardStatueOfLiberty
    Use Quizgecko on...
    Browser
    Browser