Podcast
Questions and Answers
What is the primary goal of system security controls and safeguards?
What is the primary goal of system security controls and safeguards?
What is a common technique used to extract passwords?
What is a common technique used to extract passwords?
What is a type of attack that involves fraudulent websites?
What is a type of attack that involves fraudulent websites?
What is a method to prevent password attacks?
What is a method to prevent password attacks?
Signup and view all the answers
What is a type of physical threat to a system?
What is a type of physical threat to a system?
Signup and view all the answers
What is a measure to ensure physical security?
What is a measure to ensure physical security?
Signup and view all the answers
What is a good practice for creating passwords?
What is a good practice for creating passwords?
Signup and view all the answers
What is an issue related to passwords?
What is an issue related to passwords?
Signup and view all the answers
What is an alternative to passwords?
What is an alternative to passwords?
Signup and view all the answers
What can be used to evaluate the strength of a password?
What can be used to evaluate the strength of a password?
Signup and view all the answers
Why is it recommended to use a sentence to create a password?
Why is it recommended to use a sentence to create a password?
Signup and view all the answers
What is a design problem related to passwords?
What is a design problem related to passwords?
Signup and view all the answers
What is an example of biometric data?
What is an example of biometric data?
Signup and view all the answers
What is an alternative to traditional passwords?
What is an alternative to traditional passwords?
Signup and view all the answers
What is the primary purpose of additional login steps after giving a username and password?
What is the primary purpose of additional login steps after giving a username and password?
Signup and view all the answers
What type of malware is designed to steal, encrypt, or delete sensitive information?
What type of malware is designed to steal, encrypt, or delete sensitive information?
Signup and view all the answers
What is the primary function of a keylogger?
What is the primary function of a keylogger?
Signup and view all the answers
What is the main difference between a virus and a worm?
What is the main difference between a virus and a worm?
Signup and view all the answers
What is the primary purpose of a CAPTCHA?
What is the primary purpose of a CAPTCHA?
Signup and view all the answers
What is a Trojan?
What is a Trojan?
Signup and view all the answers
What is the primary function of a rootkit?
What is the primary function of a rootkit?
Signup and view all the answers
What is a botnet?
What is a botnet?
Signup and view all the answers
Study Notes
System Security
- System security involves controls and safeguards to minimize downtime, interference, and malicious intrusion.
Physical Security
- Physical threats to a system include:
- Physical access to devices
- Attaching components to devices
- Tampering with devices
- Jamming wires
- Countermeasures include:
- Access control
- Surveillance
- Backup
OS and Application Security
- Attacks on OS and applications include:
- Password attacks
- Malware attacks
- Pharming
- Spam
- Phishing attacks
Password Attacks
- Password attacks are a common technique to authenticate systems.
- Passwords can be extracted through:
- Sniffing
- Brute force
- Dictionary attack
- Prevention measures include:
- Setting strong, hard-to-guess passwords
- Account lock features
- Multi-factor authentication
- Encryption
Issues Related to Passwords
- Design problems include using personal data.
- Operation issues include using common or easy-to-guess passwords.
- Application issues include password checking issues.
Good Practices for Creating Passwords
- Dos:
- Use lengthy passwords
- Use case-sensitive passwords
- Include numbers and special characters
- Use random characters
- Make passwords memorable
- Don'ts:
- Use personal data
- Use short passwords
- Use repetitive characters
- Use the same password for multiple applications
Alternatives to Passwords
- Biometric data includes:
- Signatures
- Face recognition
- Voice recognition
- Fingerprints
- Iris patterns
- Additional questions, such as:
- What is your pet's name?
- What is your hometown?
- Where did you complete secondary school?
Multi-Factor Authentication
- Additional login steps after entering a username and password.
Malware Attacks
- Malware is unwanted software installed without consent.
- Risks include:
- Stealing, encrypting, or deleting sensitive information
- Hijacking or altering core system functions
- Monitoring user activity without permission
- Extorting money
- Introducing spam or forced advertising
Types of Malware
- Ransomware: disables access to data until ransom is paid.
- Spyware: collects user activity data without knowledge.
- Adware: serves unwanted advertisements.
- Trojan: disguises itself as desirable code or software, distributing viruses, worms, spyware, etc.
- Worms: spreads through a network by replicating itself.
- Virus: piece of code that inserts itself into an application and executes when the app is run.
- Rootkits: gives hackers remote control of a victim's device.
- Keyloggers: spyware that monitors user activity.
- Bots/Botnet: software application that performs automated tasks on command.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers physical and system security threats and controls, including downtime, interference, malicious intrusion, physical access, and tampering with devices.