Untitled Quiz
48 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What should you do if an antivirus program flags an e-mail attachment as infected?

  • Delete the attachment immediately (correct)
  • Open the attachment to assess the issue
  • Ignore the alert from the antivirus program
  • Forward the attachment to someone else

How does IP spoofing affect network security?

  • It allows an intruder to masquerade as a trusted source (correct)
  • It blocks unauthorized access from external IP addresses
  • It strengthens network security by verifying user identity
  • It ensures that all transmissions are encrypted

What is the primary function of a personal firewall utility?

  • To store personal data securely
  • To protect the computer from unauthorized intrusions (correct)
  • To provide internet access at higher speeds
  • To manage user passwords effectively

What is a key characteristic of a denial of service attack?

<p>It disrupts access to an internet service (B)</p> Signup and view all the answers

What is the purpose of installing antivirus software on all your computers?

<p>To detect and remove viruses, worms, or Trojans (B)</p> Signup and view all the answers

Which of the following describes a back door in software?

<p>A way to access the software without normal authentication (D)</p> Signup and view all the answers

What is a common consequence of not using a personal firewall?

<p>Vulnerability to unauthorized intrusions (C)</p> Signup and view all the answers

What is the function of a firewall?

<p>To prevent unauthorized intrusion to a network (D)</p> Signup and view all the answers

What is the primary function of intrusion detection software?

<p>To analyze network traffic and identify suspicious behavior (C)</p> Signup and view all the answers

What is a biometric device used for?

<p>To authenticate a person's identity using personal characteristics (D)</p> Signup and view all the answers

What does access control specifically define?

<p>The users who can access a computer and their permissions (D)</p> Signup and view all the answers

Which method can help enhance password security?

<p>Using longer passwords with a mix of characters (D)</p> Signup and view all the answers

What is a possessed object in the context of computer security?

<p>An item someone must carry to gain access (C)</p> Signup and view all the answers

What describes hardware vandalism?

<p>Defacing or destroying computer equipment (B)</p> Signup and view all the answers

What is software theft?

<p>Illegally copying or stealing software (D)</p> Signup and view all the answers

What does a single-user license agreement allow?

<p>Backup and resale after use (A)</p> Signup and view all the answers

What is a computer security risk?

<p>Action that causes loss of or damage to a computer system (D)</p> Signup and view all the answers

Which of the following describes a virus?

<p>A program that replicates itself and uses up computer resources (C)</p> Signup and view all the answers

What is the main method through which a virus spreads via email messages?

<p>By hiding in a Word document attached to an email (A)</p> Signup and view all the answers

What is the primary effect of a Trojan horse on a computer system?

<p>It hides within legitimate software or files. (B)</p> Signup and view all the answers

How do worms differ from viruses?

<p>Worms can replicate themselves across networks, whereas viruses cannot. (D)</p> Signup and view all the answers

Which of the following is NOT a technique to safeguard against Internet and network attacks?

<p>Disabling firewall protections (A)</p> Signup and view all the answers

Which concept refers to the right of individuals to keep their information private and secure?

<p>Privacy rights (D)</p> Signup and view all the answers

What is a potential health-related disorder connected to excessive computer use?

<p>Repetitive strain injuries (B)</p> Signup and view all the answers

What is the primary function of a surge protector?

<p>To safeguard equipment from electrical power disturbances (B)</p> Signup and view all the answers

Which type of backup involves creating copies of all files in a computer?

<p>Full backup (B)</p> Signup and view all the answers

What is the recommended method to ensure the security of a wireless access point?

<p>Enable Wi-Fi Protected Access (WPA) (D)</p> Signup and view all the answers

Which of the following best describes a backup?

<p>A duplicate of files, programs, or disks (A)</p> Signup and view all the answers

What can cause prolonged malfunction of a computer?

<p>Faulty hardware or natural disasters (B)</p> Signup and view all the answers

What do codes of conduct in IT primarily address?

<p>Ethical usage of computers and information systems (C)</p> Signup and view all the answers

What is the effect of an undervoltage condition?

<p>A drop in electrical supply (D)</p> Signup and view all the answers

What rights are granted by intellectual property laws?

<p>Legal protection for creators of original work (C)</p> Signup and view all the answers

What is the primary purpose of a cookie?

<p>To store user preferences and data (A)</p> Signup and view all the answers

Which of the following best describes spyware?

<p>A program installed without the user's knowledge (B)</p> Signup and view all the answers

What is the main function of anti-spam programs?

<p>To attempt to remove spam messages from inboxes (B)</p> Signup and view all the answers

What is phishing primarily aimed at achieving?

<p>To obtain personal and financial information (A)</p> Signup and view all the answers

When might users choose to disable cookies?

<p>When they wish to maintain their privacy online (C)</p> Signup and view all the answers

What does adware primarily do?

<p>It displays online advertisements to users (D)</p> Signup and view all the answers

How can users effectively manage spam emails?

<p>By using email filtering services (B)</p> Signup and view all the answers

Which of the following describes content filtering?

<p>A method to block certain types of internet content (A)</p> Signup and view all the answers

What is the main focus of computer forensics?

<p>Discovery, collection, and analysis of evidence (B)</p> Signup and view all the answers

Which condition is commonly associated with excessive computer use?

<p>Computer vision syndrome (CVS) (B)</p> Signup and view all the answers

What does the Internet Content Rating Association (ICRA) provide?

<p>A rating system for Web content (C)</p> Signup and view all the answers

Which method helps prevent tendonitis or carpal tunnel syndrome?

<p>Dangle arms loosely at sides and shake arms and hands (C)</p> Signup and view all the answers

What is an important aspect of ergonomics?

<p>Adjustable height for chairs (C)</p> Signup and view all the answers

What is green computing primarily concerned with?

<p>Reducing electricity and environmental waste (D)</p> Signup and view all the answers

What common health issue involving vision is related to prolonged computer screen use?

<p>Computer vision syndrome (CVS) (C)</p> Signup and view all the answers

Which of the following is NOT a precaution to prevent computer-related injuries?

<p>Keep wrists angled downward while typing (A)</p> Signup and view all the answers

Flashcards

Computer Security Risk

Any action causing loss or damage to a computer system.

Virus

A program that can potentially damage files and spread to networks.

Worm

A program that copies itself repeatedly, using up computer resources and possibly shutting down the computer.

Trojan Horse

A program that hides a destructive event (payload) and is delivered when you open a file, run a program, or boot a computer with an infected disk.

Signup and view all the flashcards

Virus Email Spreading

Viruses can be hidden in email attachments and spread to other users when opened.

Signup and view all the flashcards

Email Virus Step 1

Unscrupulous programmers create a virus program.

Signup and view all the flashcards

Email Virus Step 2

Programmers use the internet to spread the virus through emails.

Signup and view all the flashcards

Email Virus Step 3

Users unknowingly open the infected email attachments spreading the virus.

Signup and view all the flashcards

Email Attachment Safety

Only open email attachments from trusted sources. Install antivirus software on all computers.

Signup and view all the flashcards

Denial of Service Attack

An attack that disrupts computer access to internet services like web or email.

Signup and view all the flashcards

Back Door (Hacking)

A program enabling unauthorized access to a computer system.

Signup and view all the flashcards

Spoofing

Making a network transmission appear legitimate, often using a fake IP address.

Signup and view all the flashcards

Firewall

A security system (hardware or software) that prevents unauthorized intrusion into a computer system.

Signup and view all the flashcards

Personal Firewall

A program protecting a personal computer from unauthorized access, monitoring transmissions.

Signup and view all the flashcards

Antivirus Software

Protects computers from viruses, worms, or Trojans. Helps flag infected attachments.

Signup and view all the flashcards

Computer Security in Programs

Enable or disable macros in programs to improve security. Install antivirus protection to prevent infections.

Signup and view all the flashcards

Intrusion Detection Software

Software that monitors network traffic for suspicious activity and identifies intrusions.

Signup and view all the flashcards

Access Control

Rules that determine who can access computer resources and what actions they can take.

Signup and view all the flashcards

Audit Trail

Records of access attempts to a computer system.

Signup and view all the flashcards

User Name

A unique identifier for a computer user.

Signup and view all the flashcards

Password

A secret combination of characters that allows access to computer resources.

Signup and view all the flashcards

Possessed Object

An item a user must carry to gain access to a computer or facility.

Signup and view all the flashcards

Biometric Device

A device that authenticates a person's identity using unique characteristics.

Signup and view all the flashcards

Software Theft

The act of stealing or illegally copying software.

Signup and view all the flashcards

Computer Security Risk

Anything that can harm a computer system, losing hardware, software, or data.

Signup and view all the flashcards

Power Disturbances

Problems with electricity like surges (too much), drops (too little), and noise.

Signup and view all the flashcards

Surge Protector

Device protecting electronics from power fluctuations.

Signup and view all the flashcards

Backup

A duplicate of files, programs, or disks, important in case of system failure.

Signup and view all the flashcards

Wireless Security

Protecting your WAP (wireless access point) so no one else can use or access it.

Signup and view all the flashcards

Computer Ethics

Moral rules for using computers and information systems.

Signup and view all the flashcards

IT Code of Conduct

Rules of behavior for using IT systems.

Signup and view all the flashcards

Uninterruptible Power Supply (UPS)

A surge protector providing power during a power outage.

Signup and view all the flashcards

Cookies

Small files on your computer that store data about your online preferences and browsing habits.

Signup and view all the flashcards

Web Merchants

Websites that collect your information when you fill out forms.

Signup and view all the flashcards

Spyware

A program installed secretly on your computer without your knowledge, often for malicious purposes.

Signup and view all the flashcards

Spam

Unsolicited email messages sent to multiple recipients.

Signup and view all the flashcards

Phishing

A scam where someone pretends to be legitimate to get your personal information.

Signup and view all the flashcards

Content Filtering

Blocking specific content (online)

Signup and view all the flashcards

E-mail Filtering

Service that blocks emails from certain sources.

Signup and view all the flashcards

Anti-spam programs

Programs that try to identify and remove spam.

Signup and view all the flashcards

Internet Content Rating

A system to categorize web content, helping users find appropriate material.

Signup and view all the flashcards

Computer Forensics

Investigating digital evidence on computers and networks.

Signup and view all the flashcards

Computer Vision Syndrome

Eye and vision problems from computer use.

Signup and view all the flashcards

Ergonomics

Study of workplace comfort, efficiency, and safety.

Signup and view all the flashcards

Carpal Tunnel Syndrome

Nerve inflammation in the forearm and hand.

Signup and view all the flashcards

Green Computing

Using computers in an environmentally friendly way.

Signup and view all the flashcards

Web Filtering Software

Software that limits access to specific websites.

Signup and view all the flashcards

Health Concerns of Computer Use

Problems like eye strain, repetitive strain injuries, and addiction.

Signup and view all the flashcards

Study Notes

Introduction to Computing - Module 8

  • Module 8 covers Computer Security, Ethics, and Privacy.

Objectives

  • Explain computer security risks and types of cybercrime perpetrators.
  • Describe various internet and network attacks, and ways to safeguard against them.
  • Discuss techniques for preventing unauthorized computer access and use.
  • Discuss preventing health-related disorders and injuries from computer use.
  • Discuss issues related to information accuracy, intellectual property rights, codes of conduct, and green computing.

Computer Security Risks

  • Computer security risks are actions that cause loss or damage to the computer system.

Computer Viruses, Worms, and Trojan Horses

  • Virus: A potentially damaging computer program that can spread and damage files.

  • Worm: Copies itself repeatedly, using up resources, potentially shutting down a computer or network.

  • Trojan Horse: Hides within or looks legitimate but triggers harmful events or actions after initial execution.

  • Payload: Destructive event triggered when opening a file, running a program, or booting with an infected disk.

  • Viruses can spread through e-mail messages:

  • Unscrupulous programmers create a virus program, hiding it in a Word document, attaching the Word document to an e-mail.

  • Some users that open the attachment become infected.

  • Other users, who do not recognize the sender and open the e-mail message, are not infected.

  • The virus is then sent to thousands of users.

  • Preventing Macro Viruses:

  • Set macro security level in applications.

  • Macros are disabled by default, notifications will show when documents contain macros.

  • Macros act as a small program that automates common tasks.

  • Antivirus programs:

  • Identify and remove computer viruses.

  • Usually protect against worms and Trojan horses.

  • Virus Signature:

  • Specific pattern of virus code.

  • Also called virus definition.

  • Antivirus programs look for virus signatures.

How does an Antivirus Program Inoculate a Program File?

  • Records program info (size, creation date).
  • Detects if virus tampers with files.
  • Keeps infected files in separate area of hard disk to prevent further damage.
  • Attempts to remove detected viruses.

Tips for Preventing Virus, Worm, and Trojan Horse Infections

  • Set macro security in programs, enabling or disabling macros as needed.
  • Install antivirus programs on all computers.
  • Never open e-mail attachments unless expecting from a trusted source.
  • Check all downloaded programs for viruses, worms, and/or Trojan horses.
  • Install a personal firewall.
  • If an attachment is identified as infected, immediately delete it.

Denial of Service Attack and Back Door

  • Denial of Service Attack: An assault disrupting computer access to internet services like the Web or e-mail.
  • Back Door: A program or set of instructions in a program that bypasses security controls to access a computer resource.

Spoofing

  • IP spoofing occurs when an intruder computer fools a network into believing its IP address is from a trusted source.
  • Perpetrators trick their victims to interact with a fake website.

Firewall

  • Security system (hardware and/or software) that prevents unauthorized intrusions.

Personal Firewall Utility

  • A program that protects a personal computer's data from unauthorized intrusions.
  • Monitors transmissions to and from the computer.
  • Informs the user of attempted intrusions.

Unauthorized Access and Use

  • Intrusion Detection Software: Analyzes network traffic, assesses system vulnerabilities, and identifies suspicious behavior.
  • Access Control: Defines who can access a computer and what actions they can take.
  • Audit Trail Records: Documents access attempts.
  • Disabling File and Printer Sharing: Prevents unauthorized access to your computer through the internet.
  • Usernames: Unique combinations of characters identifying a user.
  • Passwords: Private combinations of characters associated with the username, enabling computer access to resources.
  • Password protection: Longer passwords provide greater security, increasing the time it takes to discover them (provided appropriate character combinations are used).
  • Possessed Objects: Items a user must carry to access a computer or facility (e.g., ATM card, ID card).
  • Biometric devices: Authenticate person's identity using personal characteristics like fingerprints, hand geometry, voice, signature, and iris.

Hardware Theft and Vandalism

  • Hardware Theft: Stealing computer equipment.
  • Hardware Vandalism: Defacing or destroying computer equipment.
  • Methods to protect from theft: Cables and locking mechanisms.
  • Security Methods: Passwords, possessed objects, biometrics for various devices (PDAs/phones).

Software Theft

  • Software Theft: Stealing or illegally copying software, or intentionally erasing programs.
  • Software Piracy: Illegal duplication of copyrighted software.
  • License Agreements: Grants right to use software on a specific computer, prohibiting copying and selling.

Safeguarding Software Theft

  • Product Activation: Allowing users to input product identification numbers online or by phone to receive unique installation ID numbers.
  • Business Software Alliance (BSA): Promote the awareness of software piracy problems resulting from unauthorized copying without licensing.

Information Theft

  • Encryption: Converting readable data (plaintext) into unreadable characters (ciphertext) to protect from theft.
  • Encryption methods often use multiple methods.
  • Encryption key: Formula for decryption (deciphering).
  • Encrypting Files/Folders in Windows: Locate the file/folder, right-click, select Properties, navigate to the General tab and click Advanced, select Encrypt content to secure data.

Internet Security Risks

  • Encryption: Web browsers use encryption to transmit data securely. Websites beginning with "https" typically use encryption to help secure connections.
  • Digital Certificates: Confirm website legitimacy, ensuring secure connections.
  • Certificate Authority (CA): Authorized individuals/companies that issue and verify digital certificates.

Secure Socket Layer (SSL)

  • Encrypts data transferred between client systems (e.g., web browser) and the internet server.
  • "https" in web addresses indicates secure connections.

System Failure

  • System Failure: Prolonged malfunction of a computer, caused by factors like aging hardware, natural disasters, and electrical problems (e.g., power surges or outages).
  • Surge protector: Protects computer equipment from electrical disturbances.
  • Uninterruptible power supply (UPS): A surge protector that continues providing power during electrical power loss.

Backing Up

  • Backup: Duplicates of files (programs/discs) to restore files after system failure/corrupted files. Includes full and selective backups, as well as multiple copies for redundancy (e.g., three generation backups).

Wireless Security

  • Secure your Wireless Access Point (WAP) and do not broadcast the network name.
  • Enable WPA (Wired Equivalent Privacy/Wi-Fi Protected Access)

Health Concerns of Computer Use

  • Computer Vision Syndrome (CVS): Eye and vision problems

  • Repetitive Strain Injury (RSI): Strain on tendons/muscles due to repeated motions

  • Carpal Tunnel Syndrome (CTS): Inflammation of the nerve that connects the forearm to the palm, resulting from repeated motions

  • Computer Addiction: When computer use dominates a person's entire social life.

  • Preventing RSI/CTS: Spread fingers apart, keeping wrists straight, gently push back fingers/thumb, and dangle arms loosely, then shake arms.

  • Easing Eyestrain: Taking frequent breaks (every 10-15 minutes) looking into the distance, blinking regularly, and positioning the display at eye level.

  • Ergonomics: Applied science focusing on comfort, efficiency, and safety in the workplace (e.g., proper posture, adjusting chair, desk).

  • Green Computing: Reducing electricity and environmental waste during computer use.

  • Use ENERGY STAR compliant devices and peripherals

  • Avoid turning the computer off/on multiple times during the day, and only shutting down when not in use.

  • Use paperless methods for communications

  • Recycle old computers, paper, toner cartridges.

  • Telecommute or walk to cut down on car emissions

Additional Information (Ethics and Society)

  • Computer Ethics: Moral guidelines for computer and information systems use (e.g., avoiding harm to other people and software theft). This includes consideration of unauthorized use of computer systems & networks, intellectual property rights, codes of conduct, accuracy of information, and information privacy.

  • IT Code of Conduct: Written guidelines for employee computer use.

  • Information Privacy: The right of individuals/companies to control personal information, including ways to protect it, such as the use of electronic profiles, cookies, controls against spam and phishing, content filtering systems, and computer forensics.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Untitled Quiz
6 questions

Untitled Quiz

AdoredHealing avatar
AdoredHealing
Untitled Quiz
37 questions

Untitled Quiz

WellReceivedSquirrel7948 avatar
WellReceivedSquirrel7948
Untitled Quiz
55 questions

Untitled Quiz

StatuesquePrimrose avatar
StatuesquePrimrose
Untitled Quiz
48 questions

Untitled Quiz

StraightforwardStatueOfLiberty avatar
StraightforwardStatueOfLiberty
Use Quizgecko on...
Browser
Browser