computer security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define computer security.

A

Computer Security refers to the security given to the computer for the protection of hardware, software, data and information from any means i.e. being lost or damaged due to accidental or intentional harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is hardware security?

A

The protection of computer hardware from dust, overheat, fluctuation of electric power and intentional harm is called hardware security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is data and information security?

A

Data security is the prevention of unauthorized access, use, disruption, modification or destruction of data in storage. Information security is the prevention of unauthorized access, use, disruption, modification or destruction of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List some points how we can protect our data.

A

We can protect our data by:
i) Periodically checking the hard disk and replacing it if it shows failure symptoms;
ii) Copying data in another external media like external hard disk, pen drive or DVD disk and storing it in another location.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a backup? Why is backup vital to computer security system?

A

Backup is the way of securing the information. They are the separate copy of the important data or software kept in another reliable location to protect from being damaged.

Backup allows to restore data that is damaged or destroyed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Write down any six possible threats to computer security.

A

Any six possible threats to computer security are:
i) Theft
ii) Fire
iii) Dust and dirt
iv) Malware
v) Hacker
vi) Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is password? Why is password used in a computer?

A

Password is a secret word, phrase or combination of characters that gives a user access to particular file, program or system. It helps from being accessed by unauthorized person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Encryption and Decryption.

A

Encryption is the process of translating plain text data (plaintext) into something that appears to be random and meaningless (ciphertext). Decryption is the process of converting ciphertext back to plaintext.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Briefly explain how public key cryptography works.

A

Public key cryptography is a class of cryptographic protocols based on algorithms that require two separate keys, one private and one public. It uses a pair of keys to encrypt and decrypt data to protect it against unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the security threats? Explain in brief any two.

A

Anything that can cause harm is a threat. In the context of computer security, a threat can be a burglar, a virus, or user error.

i) Phishing: A deceptive online attempt to obtain confidential information.
ii) Botnet: A collection of internet-connected devices sending spam or participating in DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How would you protect against a Denial-of-Service attack?

A

Keep your security software updated, consider a router with built-in DDoS protection, configure firewalls to reject bogus traffic, and look for a secure website hosting service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Who are the White hats hackers? What do they do?

A

White hats are hackers who work to keep data safe from other hackers by finding system vulnerabilities that can be mitigated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Who are Grey hat hackers?

A

Grey hats include those who hack for fun or to troll, often exploiting vulnerabilities without financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are malicious codes?

A

Malicious code is harmful computer code designed to create system vulnerabilities leading to security breaches and data theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware and how can we protect it?

A

Malware is a general term for threats designed to cause harm to your PC or steal information. Protection includes using trusted antivirus software, configuring regular scans, and staying updated on the latest attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define antivirus software with four examples.

A

Antivirus software is used to prevent, detect, and remove malware. Examples include:
i) AVG Internet Security
ii) Bitdefender Antivirus
iii) ESET NOD32 Antivirus
iv) Kaspersky Internet Security

17
Q

Is a computer with anti-virus software protected from viruses? Why or why not?

A

Antivirus software is important for protection, but it is not 100% guaranteed as viruses and malware threats have evolved.

18
Q

Define Firewall with examples.

A

A firewall acts as a barrier between a trusted system and outside connections, filtering data. It can be created using hardware or software.

19
Q

What is biometric verification?

A

Biometric verification is the process of identifying individuals via unique characteristics, allowing access to services or systems.

20
Q

How do biometric devices help improve security?

A

Biometric security devices increase protection as it is harder to clone or steal a fingerprint than an access card or password.

21
Q

Write down any four preventive security measures of computer hardware security.

A

Preventive measures include:
i) Regular Maintenance
ii) Insurance
iii) Free from dust
iv) Fire protection

22
Q

Point out any four computer software security measures.

A

Software security measures include:
i) Establish strong passwords
ii) Set up a firewall
iii) Installation of antivirus protection
iv) Regularly update

23
Q

What is power protection device? Write its role in the computer security.

A

A power protection device protects computer hardware from electricity fluctuations and may provide backup power during failures.

24
Q

Why is it important to protect computer system from dust?

A

Dust build-up can cause overheating and damage to components, making it essential to keep the computer room free from dust.

25
Q

When is it especially important to use a firewall?

A

Firewalls provide protection against outside cyber attackers by shielding your computer or network from malicious traffic.

26
Q
A