System Security Threats and Controls
22 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary goal of system security controls and safeguards?

  • To increase downtime
  • To jam wires
  • To minimize downtime, interference, and malicious intrusion (correct)
  • To grant physical access to devices
  • What is a common technique used to extract passwords?

  • Sniffing (correct)
  • Pharming
  • Phishing
  • Spamming
  • What is a type of attack that involves fraudulent websites?

  • Pharming (correct)
  • Malware
  • Spamming
  • Phishing
  • What is a method to prevent password attacks?

    <p>Setting a good password that cannot be easily guessed</p> Signup and view all the answers

    What is a type of physical threat to a system?

    <p>Unauthorized physical access to devices</p> Signup and view all the answers

    What is a measure to ensure physical security?

    <p>Surveillance</p> Signup and view all the answers

    What is a good practice for creating passwords?

    <p>Using case sensitive passwords with numbers and special characters</p> Signup and view all the answers

    What is an issue related to passwords?

    <p>Using common passwords</p> Signup and view all the answers

    What is an alternative to passwords?

    <p>Face recognition</p> Signup and view all the answers

    What can be used to evaluate the strength of a password?

    <p>A website that estimates the cracking time</p> Signup and view all the answers

    Why is it recommended to use a sentence to create a password?

    <p>It makes the password easier to remember</p> Signup and view all the answers

    What is a design problem related to passwords?

    <p>Using personal data</p> Signup and view all the answers

    What is an example of biometric data?

    <p>Fingerprint</p> Signup and view all the answers

    What is an alternative to traditional passwords?

    <p>Providing multiple questions</p> Signup and view all the answers

    What is the primary purpose of additional login steps after giving a username and password?

    <p>To provide an extra layer of security</p> Signup and view all the answers

    What type of malware is designed to steal, encrypt, or delete sensitive information?

    <p>Ransomware</p> Signup and view all the answers

    What is the primary function of a keylogger?

    <p>To track user activity</p> Signup and view all the answers

    What is the main difference between a virus and a worm?

    <p>A virus needs human interaction to spread, while a worm can spread automatically</p> Signup and view all the answers

    What is the primary purpose of a CAPTCHA?

    <p>To identify human users and prevent automated programs</p> Signup and view all the answers

    What is a Trojan?

    <p>A type of malware that disguises itself as desirable code or software</p> Signup and view all the answers

    What is the primary function of a rootkit?

    <p>To give hackers remote control of a victim's device</p> Signup and view all the answers

    What is a botnet?

    <p>A software application that performs automated tasks on command</p> Signup and view all the answers

    Study Notes

    System Security

    • System security involves controls and safeguards to minimize downtime, interference, and malicious intrusion.

    Physical Security

    • Physical threats to a system include:
    • Physical access to devices
    • Attaching components to devices
    • Tampering with devices
    • Jamming wires
    • Countermeasures include:
    • Access control
    • Surveillance
    • Backup

    OS and Application Security

    • Attacks on OS and applications include:
    • Password attacks
    • Malware attacks
    • Pharming
    • Spam
    • Phishing attacks

    Password Attacks

    • Password attacks are a common technique to authenticate systems.
    • Passwords can be extracted through:
    • Sniffing
    • Brute force
    • Dictionary attack
    • Prevention measures include:
    • Setting strong, hard-to-guess passwords
    • Account lock features
    • Multi-factor authentication
    • Encryption
    • Design problems include using personal data.
    • Operation issues include using common or easy-to-guess passwords.
    • Application issues include password checking issues.

    Good Practices for Creating Passwords

    • Dos:
    • Use lengthy passwords
    • Use case-sensitive passwords
    • Include numbers and special characters
    • Use random characters
    • Make passwords memorable
    • Don'ts:
    • Use personal data
    • Use short passwords
    • Use repetitive characters
    • Use the same password for multiple applications

    Alternatives to Passwords

    • Biometric data includes:
    • Signatures
    • Face recognition
    • Voice recognition
    • Fingerprints
    • Iris patterns
    • Additional questions, such as:
    • What is your pet's name?
    • What is your hometown?
    • Where did you complete secondary school?

    Multi-Factor Authentication

    • Additional login steps after entering a username and password.

    Malware Attacks

    • Malware is unwanted software installed without consent.
    • Risks include:
    • Stealing, encrypting, or deleting sensitive information
    • Hijacking or altering core system functions
    • Monitoring user activity without permission
    • Extorting money
    • Introducing spam or forced advertising

    Types of Malware

    • Ransomware: disables access to data until ransom is paid.
    • Spyware: collects user activity data without knowledge.
    • Adware: serves unwanted advertisements.
    • Trojan: disguises itself as desirable code or software, distributing viruses, worms, spyware, etc.
    • Worms: spreads through a network by replicating itself.
    • Virus: piece of code that inserts itself into an application and executes when the app is run.
    • Rootkits: gives hackers remote control of a victim's device.
    • Keyloggers: spyware that monitors user activity.
    • Bots/Botnet: software application that performs automated tasks on command.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz covers physical and system security threats and controls, including downtime, interference, malicious intrusion, physical access, and tampering with devices.

    More Like This

    Computer Security and Cyber Security Quiz
    5 questions

    Computer Security and Cyber Security Quiz

    ConsistentTropicalRainforest avatar
    ConsistentTropicalRainforest
    Cyber Security Essentials Quiz
    5 questions

    Cyber Security Essentials Quiz

    PrestigiousChalcedony7655 avatar
    PrestigiousChalcedony7655
    Network Security Overview
    5 questions

    Network Security Overview

    AdequateSalamander avatar
    AdequateSalamander
    Computer Security Risks
    11 questions
    Use Quizgecko on...
    Browser
    Browser