ICT Midterm Worksheet PDF

Summary

This document is a worksheet containing questions on ICT topics like physical security, e-security, cyberattacks, and malware. It provides definitions and examples related to these concepts, including prevention measures.

Full Transcript

What is physical security? [Ans) Physical security is a security that aims to protect tangible assets such as building and equipments by considering dangerous and creating a safe environment when using technology. ] Describe some physical security risk? Ans) +-----------------------+------------...

What is physical security? [Ans) Physical security is a security that aims to protect tangible assets such as building and equipments by considering dangerous and creating a safe environment when using technology. ] Describe some physical security risk? Ans) +-----------------------+-----------------------+-----------------------+ | Safety risk | Cause of safety risk | Prevention measures | +=======================+=======================+=======================+ | Electrocution | Spilling liquids or | No drinks in the | | | drink on electric | computer room\ | | | equipment.\ | check wires regularly | | | Exposed wires/damages | and renew the ones | | | insulation | with bad insulation | +-----------------------+-----------------------+-----------------------+ | Fire hazard | Equipment overheating | Do not cover any | | | | cooling vents on | | | Sockets being over | computer equipment. | | | loaded | | | | | Have good ventilation | +-----------------------+-----------------------+-----------------------+ | Tripping hazard | Trailing wires on the | Use wireless device | | | floor | where possible | | | | | | | Damaged carpets and | Keep cables away from | | | other flooring | areas where people | | | | are walking | +-----------------------+-----------------------+-----------------------+ | Personal injury | Heavy equipment | Use stronger desk\ | | | falling from the | use larger desk | | | desk\ | | | | desk collapsing due | | | | to large weight | | +-----------------------+-----------------------+-----------------------+ What is E-security? [Ans) it is a security that focused on protecting intangible assets such as data and networks from unauthorized access such as hacking ,malware and viruses. ] DATA PROTECTION ACT (DPA) is there in most countries. List some personal data and sensitive personal data? Personal data the one that can easily be hacked Sensitive data ------------------------------------------------- ------------------ Name Race Date of birth Gender Phone number Religion Email address Criminal records Salary details Medical history How can you keep your data safe? [Ans) by having a strong password\ having firewall present in the system\ download and scan your computer with antivirus\ make use of biometrics scans\ use VPN (virtual private network)] List the types of cyberattacks. Ans) [ phishing,Vishing,Smishing,Pharming,Hacking,Viruses,Maleware,cardfraud.] What is phishing? [Ans) it is a way of stealing personal information typically in the form of username, password ,bank account information, credit card number and other important data and this happens by sending a legitimated email claiming that they are a large company and steal your information.] What is smishing? Ans) [it is a form of phishing where the cybercriminal sends a SMS to the user which may include a malicious website link that will steal the user data.\ \ ]What is vishing? Ans) [it has the same aim as phishing which is to obtain personal data and this happens using telephone calls where the cybercriminal acts as if he is someone working in the bank and that there is a problem in your bank account.] What is pharming? Ans)It is a type of data stealing where the unauthorized person installs a malicious code on the person hard drive or server which takes them to a fake website that looks exactly as the real one and there information will get stolen. What is hacking? Ans)[it is the act of gaining unauthorized a access to a computer system which can lead to id thief misuse of personal data or deletion or corruption of data] How can we prevent hacking? 1. Use firewall 2. Use strong password 3. Make use of anti hacking software 4. Use of IDs as well as password What are the types of malware? 1. viruses 2. worms 3. Trojan horse 4. Keylogging 5. Adware 6. Ransomware What is malware? Ans) [a malware is a malicious code that is created with the intend to do harm to a computer, network ,or system.] What is virus? Ans) [it a program that replicates it self with the intention of deleting or corrupting data which often cause the computer to malfunction and which need active host for it to spread on and require human interaction ] What is worms? [Ans)A worm is a type of malware that can automatically self replicate it self without human interaction, and this enables it to spread to other computer across a network.they usually arrive as a message attachment and only one user need to open the worm infested email to infect the whole network. They usually spread through LAN] What is Trojan horse? A Trojan horse is a type of malware that downloads onto a computer disguised as a legitimate program they usually arrive as an email attachment or are downloaded from an infected website. They are usually highly dangerous as they can destroy files and information on a hard disks. They also give cyber criminals access to your personal information on your computer such as your IP addresses, passwords and other personal data. They also install spyware and ransomware. What is keyloggers? Ans)[it is a type of spyware usesd to gather information by monitoring user's keyboard activityWhere the key strokes are stored in a small file and automatically emailed back to the cybercriminals. They are primarily designed to monitor and capture web browsing activity and they can be removed by antivirus.] What is adware? Ans)[it is malware that flood an end user's computer with unwanted advertisements they highlight weakness in user's security and they are hard to be removed by antivirus because they are mostly recognized as harmless.also they can hijack a browser and they install viruses in a computer.] What is Ransomware? [Ans) Ransomware is a malware designed to deny a user or organization access to files on their computer.By encrypting these files and demanding a ransom payment for the decryption key.] What is card fraud? [It is the illegal use of credit/debit card.This includes Shoulder surfing-Form of data theft where criminals steal personal information when the people use a cash dispensing machine. card cloning.] What is card cloning? Card cloning involves copying credit or debit cards that utilize a magnetic stripe, typically using an electronic device called a skimmer. Skimmers are data capture devices that criminals place in ATM slots to record the information stored on the card's magnetic stripe. In addition to skimmers, a newer device known as a shimmer is used for reading smart cards; it consists of a thin shim containing a chip and flash drive that can be inserted into card reading slots. Methods of protecting data

Use Quizgecko on...
Browser
Browser