computer security Flashcards
Define computer security.
Computer Security refers to the security given to the computer for the protection of hardware, software, data and information from any means i.e. being lost or damaged due to accidental or intentional harm.
What is hardware security?
The protection of computer hardware from dust, overheat, fluctuation of electric power and intentional harm is called hardware security.
What is data and information security?
Data security is the prevention of unauthorized access, use, disruption, modification or destruction of data in storage. Information security is the prevention of unauthorized access, use, disruption, modification or destruction of information.
List some points how we can protect our data.
We can protect our data by:
i) Periodically checking the hard disk and replacing it if it shows failure symptoms;
ii) Copying data in another external media like external hard disk, pen drive or DVD disk and storing it in another location.
What is a backup? Why is backup vital to computer security system?
Backup is the way of securing the information. They are the separate copy of the important data or software kept in another reliable location to protect from being damaged.
Backup allows to restore data that is damaged or destroyed.
Write down any six possible threats to computer security.
Any six possible threats to computer security are:
i) Theft
ii) Fire
iii) Dust and dirt
iv) Malware
v) Hacker
vi) Phishing
What is password? Why is password used in a computer?
Password is a secret word, phrase or combination of characters that gives a user access to particular file, program or system. It helps from being accessed by unauthorized person.
Define Encryption and Decryption.
Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext.
Briefly explain how public key cryptography works.
Public key cryptography is a class of cryptographic protocols based on algorithms that require two separate keys, one private and one public. It uses a pair of keys to encrypt and decrypt data to protect it against unauthorized access.
What are the security threats? Explain in brief any two.
Anything that can cause harm is a threat. In the context of computer security, a threat can be a burglar, a virus, or user error.
i) Phishing: A deceptive online attempt to obtain confidential information.
ii) Botnet: A collection of internet-connected devices sending spam or participating in DDoS attacks.
How would you protect against a Denial-of-Service attack?
Keep your security software updated, consider a router with built-in DDoS protection, configure firewalls to reject bogus traffic, and look for a secure website hosting service.
Who are the White hats hackers? What do they do?
White hats are hackers who work to keep data safe from other hackers by finding system vulnerabilities that can be mitigated.
Who are Grey hat hackers?
Grey hats include those who hack for fun or to troll, often exploiting vulnerabilities without financial gain.
What are malicious codes?
Malicious code is harmful computer code designed to create system vulnerabilities leading to security breaches and data theft.
What is malware and how can we protect it?
Malware is a general term for threats designed to cause harm to your PC or steal information. Protection includes using trusted antivirus software, configuring regular scans, and staying updated on the latest attacks.