Podcast
Questions and Answers
Match the following:
Match the following:
Boot Sector = C) Is a boot virus that attacked the Apple system Comodo = E) Computer antivirus Packet Filtering = D) Types of firewall Elk Cloner = B) Computer virus VPN = A) Virtual Private Network
Software firewalls are the equipment established between the gateway and your network.
Software firewalls are the equipment established between the gateway and your network.
False
Antivirus is a simple malicious code that hackers design to fetch data from the user.
Antivirus is a simple malicious code that hackers design to fetch data from the user.
False
This code infects the other files and program present on your system is called computer virus.
This code infects the other files and program present on your system is called computer virus.
Signup and view all the answers
---------------- enables users to safely send and receive data across shared or public networks.
---------------- enables users to safely send and receive data across shared or public networks.
Signup and view all the answers
Write or describe unit three objective.
Write or describe unit three objective.
Signup and view all the answers
------------------------ virus is installed in hidden or retrieved under the computer memory.
------------------------ virus is installed in hidden or retrieved under the computer memory.
Signup and view all the answers
Defined as firewall?
Defined as firewall?
Signup and view all the answers
What is Information, Security, and Computer?
What is Information, Security, and Computer?
Signup and view all the answers
What is the difference between firewall and antivirus?
What is the difference between firewall and antivirus?
Signup and view all the answers
________ is potential violation of security.
________ is potential violation of security.
Signup and view all the answers
Rather than intercept messages, they are called ________.
Rather than intercept messages, they are called ________.
Signup and view all the answers
The source and destination system should be available for 24 hours; this is called integrity.
The source and destination system should be available for 24 hours; this is called integrity.
Signup and view all the answers
Match the following terms:
Match the following terms:
Signup and view all the answers
Masquerade means falsely ________.
Masquerade means falsely ________.
Signup and view all the answers
Which of the following are examples of active attacks? (Select all that apply)
Which of the following are examples of active attacks? (Select all that apply)
Signup and view all the answers
Why are firewalls important?
Why are firewalls important?
Signup and view all the answers
Study Notes
Information and Computer Security
- Information is defined as organized, meaningful, and useful data for making decisions.
- Computer is an electronic machine that uses electrical power.
- Security refers to the collection of tools designed to protect data and thwart hackers.
Types of Security
- Network security: protecting data processing equipment interconnected through networks.
- Application security: securing an application by building security features to prevent cyber threats.
- Information security: risks arise from the intentional or unintentional misuse of computers, network resources, and the internet.
- Mobile and computer security: securing handheld devices and standalone machines by keeping them updated and patched.
- Cyber security: protecting computer systems that communicate over computer networks.
Threats to Computer Security
- Natural threats: natural hazards such as earthquakes, flooding, or lightning storms that can cause damage to information.
- Artificial threats: man-made threats such as denial of service, malware attacks, and phishing.
Types of Artificial Threats
- Denial of service (DoS): overloading servers to prevent them from handling requests.
- Malware attacks: spreading destructive program routines to destroy data.
- Man-in-the-middle (MITM) attacks: hacking into communication between users and websites.
- Phishing: attempting to gain sensitive personal information by posing as a legitimate entity.
- Identity theft: stealing personal information such as social security numbers, credit card numbers, and bank account information.
- Software piracy: unauthorized copying of computer programs.
Cyber Security Attacks
- Cyber bullying: ridiculing or humiliating individuals, especially children, over digital devices.
- Cyber predators: using the internet to exploit individuals, usually children, for sexual or other purposes.
- Posting private information: sharing sensitive information online without understanding social boundaries.
Attacks on Computer Systems
- Passive attacks: releasing message contents or observing traffic analysis to detect potential security breaches.
- Active attacks: masquerading, replaying, modifying, or denying service to disrupt communication.
- Hackers: unauthorized access to networked computer systems to read files, steal passwords, or access network files.
- Crackers: hackers with criminal intent to gain unauthorized access and exploit weaknesses in security protections.
- Hacktivists: crackers motivated by political or ideological goals.
Principles of Computer Security
- Confidentiality: protecting data from unauthorized users.
- Integrity: assuring that received messages have not been altered.
- Availability: ensuring that systems are available for 24 hours.
- Authentication: verifying the authenticity of communications.
- Access control: preventing misuse of resources.
Measures to Protect Computer Systems
- Installing antivirus software: detecting and removing malicious software.
- Installing firewalls: preventing unauthorized access to networks.
- Using strong passwords: protecting against unauthorized access.
- Being cautious when downloading files or opening emails: avoiding potential security breaches.
Types of Computer Viruses
- Boot sector viruses: infecting the boot sector of a computer.
- Overwrite viruses: overwriting files and programs.
- Direct action viruses: replicating themselves and spreading to other files.
- Resident viruses: remaining in memory and infecting other files.
- Polymorphic viruses: changing their code to evade detection.
- Multipartite viruses: infecting multiple parts of a system.
Firewalls
- Firewalls: software or firmware that filters incoming and outgoing traffic to prevent unauthorized access.
- Types of firewalls: packet filtering, proxy service, stateful inspection, and next-generation firewalls.
- Importance of firewalls: protecting networks from unauthorized access and cyber threats.
Difference Between Firewall and Antivirus
- Firewalls: preventing unauthorized access to networks.
- Antivirus: detecting and removing malicious software from devices.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
Learn about the fundamentals of information and computer security, including the types of security measures. Understand the importance of protecting data and systems from cyber threats.