Security Part 2 Flashcards

1
Q

Physical Access Restriction ?

A

Security Biometrics : It’s Identification of humans by their unique traits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passwords ?

A

Most common tool used to restrict access to computers like
Effective Passwords:
Not real words and Changed frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Access Privileges ?

A

It’s an access Control Software
Doesn’t need to treat all users identically
Example : At least one of the
accounts on a PC must be administrator
which has additional privileges:
Permission to install additional software
Change system settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewalls ?

A

Protect from hackers
It filters information between a private system
and the rest of the internet
It could be either : Software program , Hardware device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption ?

A

Scrambling transmitted messages to secure them using a secret code called Key

Reverse process to retrieve original message is called Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protection and prevention ?

A

Anti- Virus Software :
Protect computer/files from harm
Detect viruses and delete them
Run scheduled scans in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Audit Control Software ?

A

It’s monitoring and recording user’s computer
transactions
( tracing and identifying suspicious computer activity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backups and other precautions ?

A

Uninterrupted Power Supply (UPS) :
It Protects data loss due to Power failure

Surge Protector :
It Shields electronic equipment from
dangerous power spikes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Backup ?

A

Backups are used to replace originals
Best data recovery insurance is Regular Backups

Backup storage :
Online in the cloud : remote storage
Off-site: hard drives or flash drives stored in remote locations
Backup drive in laptops, external hard drives, network storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Types of Backups ?

A

Incremental: only new files or modified files
Happens more or less continuously
Example : Hourly, Daily

Bootable: Entire system backup
Makes a complete duplicate of a disk in case of a crash Example : Weekly or after installing new software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Safe Computing ?

A

Share with care
Handle shareware and freeware with care
Don’t pirate software
Disinfect regularly
Take your passwords
seriously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Security and Privacy ?

A

measures prevent crime but they can also threaten privacy
like :
Smart Badges :
broadcast identification codes
A badge-location database stores data about
the location of the badge (or person)
Instead of paging the entire hospital, an
operator could route the call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Security and Reliability ?

A

Software Bugs : which can cause more damage than viruses
It is impossible to eliminate all bugs
The bigger the system the bigger the problem

Y2K Bug : For decades only two digits were
used for year; e.g. (89 to 1989)
But in 2000 it would become 00 causing calculation errors and
More than 100 billion dollars spent to avert the disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

UAE Cyber crime Law ?

A

Law No 5 of 2012
Any form of misuse of a computer/smart device or an electronic network/system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Computers At War ?

A

Smart weapons :
Missiles that use computerized guidance
systems to locate their targets

Autonomous system :
Complex system that can assume almost complete responsibility for a task without
human input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Computers at War : Cyber Warfare

A

By attacking computer networks the enemy can cripple
Telecommunications , Power grids
and Water and gas supplies