Information and Computer Security Basics

Information and Computer Security Basics

Created by
@TopNotchSerpentine66

Questions and Answers

Match the following:

Boot Sector = C) Is a boot virus that attacked the Apple system Comodo = E) Computer antivirus Packet Filtering = D) Types of firewall Elk Cloner = B) Computer virus VPN = A) Virtual Private Network

Software firewalls are the equipment established between the gateway and your network.

False

Antivirus is a simple malicious code that hackers design to fetch data from the user.

False

This code infects the other files and program present on your system is called computer virus.

<p>True</p> Signup and view all the answers

---------------- enables users to safely send and receive data across shared or public networks.

<p>VPN</p> Signup and view all the answers

Write or describe unit three objective.

<p>The primary focus of this chapter will be on definitions and constructions of various cryptographic objects, to understand the design of secret codes for secure communication.</p> Signup and view all the answers

------------------------ virus is installed in hidden or retrieved under the computer memory.

<p>Boot Sector</p> Signup and view all the answers

Defined as firewall?

<p>A firewall is essential software or firmware used in network security to prevent unauthorized access.</p> Signup and view all the answers

What is Information, Security, and Computer?

<p>Information is organized, meaningful data; Computer is an electronic device powered by electricity; Security is a collection of tools designed to protect data and thwart hackers.</p> Signup and view all the answers

What is the difference between firewall and antivirus?

<p>While a firewall prevents unauthorized access to a network, an antivirus protects against malicious software.</p> Signup and view all the answers

________ is potential violation of security.

<p>Threat</p> Signup and view all the answers

Rather than intercept messages, they are called ________.

<p>Attacks</p> Signup and view all the answers

The source and destination system should be available for 24 hours; this is called integrity.

<p>False</p> Signup and view all the answers

Match the following terms:

<p>A = Threat B = Confidentiality C = Integrity D = Authentication</p> Signup and view all the answers

Masquerade means falsely ________.

<p>shown</p> Signup and view all the answers

Which of the following are examples of active attacks? (Select all that apply)

<p>Masquerade</p> Signup and view all the answers

Why are firewalls important?

<p>Firewalls are important as they prevent unauthorized access to networks, filter incoming and outgoing traffic, and protect against cyberattacks.</p> Signup and view all the answers

Study Notes

Information and Computer Security

  • Information is defined as organized, meaningful, and useful data for making decisions.
  • Computer is an electronic machine that uses electrical power.
  • Security refers to the collection of tools designed to protect data and thwart hackers.

Types of Security

  • Network security: protecting data processing equipment interconnected through networks.
  • Application security: securing an application by building security features to prevent cyber threats.
  • Information security: risks arise from the intentional or unintentional misuse of computers, network resources, and the internet.
  • Mobile and computer security: securing handheld devices and standalone machines by keeping them updated and patched.
  • Cyber security: protecting computer systems that communicate over computer networks.

Threats to Computer Security

  • Natural threats: natural hazards such as earthquakes, flooding, or lightning storms that can cause damage to information.
  • Artificial threats: man-made threats such as denial of service, malware attacks, and phishing.

Types of Artificial Threats

  • Denial of service (DoS): overloading servers to prevent them from handling requests.
  • Malware attacks: spreading destructive program routines to destroy data.
  • Man-in-the-middle (MITM) attacks: hacking into communication between users and websites.
  • Phishing: attempting to gain sensitive personal information by posing as a legitimate entity.
  • Identity theft: stealing personal information such as social security numbers, credit card numbers, and bank account information.
  • Software piracy: unauthorized copying of computer programs.

Cyber Security Attacks

  • Cyber bullying: ridiculing or humiliating individuals, especially children, over digital devices.
  • Cyber predators: using the internet to exploit individuals, usually children, for sexual or other purposes.
  • Posting private information: sharing sensitive information online without understanding social boundaries.

Attacks on Computer Systems

  • Passive attacks: releasing message contents or observing traffic analysis to detect potential security breaches.
  • Active attacks: masquerading, replaying, modifying, or denying service to disrupt communication.
  • Hackers: unauthorized access to networked computer systems to read files, steal passwords, or access network files.
  • Crackers: hackers with criminal intent to gain unauthorized access and exploit weaknesses in security protections.
  • Hacktivists: crackers motivated by political or ideological goals.

Principles of Computer Security

  • Confidentiality: protecting data from unauthorized users.
  • Integrity: assuring that received messages have not been altered.
  • Availability: ensuring that systems are available for 24 hours.
  • Authentication: verifying the authenticity of communications.
  • Access control: preventing misuse of resources.

Measures to Protect Computer Systems

  • Installing antivirus software: detecting and removing malicious software.
  • Installing firewalls: preventing unauthorized access to networks.
  • Using strong passwords: protecting against unauthorized access.
  • Being cautious when downloading files or opening emails: avoiding potential security breaches.

Types of Computer Viruses

  • Boot sector viruses: infecting the boot sector of a computer.
  • Overwrite viruses: overwriting files and programs.
  • Direct action viruses: replicating themselves and spreading to other files.
  • Resident viruses: remaining in memory and infecting other files.
  • Polymorphic viruses: changing their code to evade detection.
  • Multipartite viruses: infecting multiple parts of a system.

Firewalls

  • Firewalls: software or firmware that filters incoming and outgoing traffic to prevent unauthorized access.
  • Types of firewalls: packet filtering, proxy service, stateful inspection, and next-generation firewalls.
  • Importance of firewalls: protecting networks from unauthorized access and cyber threats.

Difference Between Firewall and Antivirus

  • Firewalls: preventing unauthorized access to networks.
  • Antivirus: detecting and removing malicious software from devices.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Computer Security Quiz
10 questions

Computer Security Quiz

ThumbsUpFantasy avatar
ThumbsUpFantasy
Computer Security Basics
30 questions
Use Quizgecko on...
Browser
Browser