Security Part 2 Flashcards

1
Q

Physical Access Restriction ?

A

Security Biometrics : It’s Identification of humans by their unique traits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Passwords ?

A

Most common tool used to restrict access to computers like
Effective Passwords:
Not real words and Changed frequently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It’s an access Control Software
Doesn’t need to treat all users identically is ?

A

Access Privileges
Example : At least one of the
accounts on a PC must be administrator
which has additional privileges:
Permission to install additional software
Change system settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewalls ?

A

Protect from hackers
It filters information between a private system
and the rest of the internet
It could be either : Software program , Hardware device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Encryption ?

A

Scrambling transmitted messages to secure them using a secret code called Key

Reverse process to retrieve original message is called Decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Protection and prevention ?

A

Anti- Virus Software :
Protect computer/files from harm
Detect viruses and delete them
Run scheduled scans in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Audit Control Software ?

A

It’s monitoring and recording user’s computer
transactions
( tracing and identifying suspicious computer activity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backups and other precautions ?

A

Uninterrupted Power Supply (UPS) :
It Protects data loss due to Power failure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It Shields electronic equipment from
dangerous power spikes

A

Surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backup ?

A

Backups are used to replace originals
Best data recovery insurance is Regular Backups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Is online in the cloud , remote storage
Off-site: hard drives or flash drives stored in remote locations
In laptops, external hard drives, network storage

A

Backup storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Only new files or modified files
Happens more or less continuously
Example : Hourly, Daily

A

Incremental backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Entire system backup
Makes a complete duplicate of a disk in case of a crash Example : Weekly or after installing new software

A

Bootable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Safe Computing ?

A

Share with care
Handle shareware and freeware with care
Don’t pirate software
Disinfect regularly
Take your passwords
seriously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Security and Privacy ?

A

Measures prevent crime but they can also threaten privacy
like :
Smart Badges
broadcast identification codes
Instead of paging the entire hospital, an
operator could route the call

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security and Reliability ?

A

Software Bugs : which can cause more damage than viruses
It is impossible to eliminate all bugs
The bigger the system the bigger the problem

Y2K Bug : For decades only two digits were
used for year; e.g. (89 to 1989)
But in 2000 it would become 00 causing calculation errors

17
Q

UAE Cyber crime Law ?

A

Law No 5 of 2012
Any form of misuse of a computer/smart device or an electronic network/system

18
Q

Missiles that use computerized guidance
systems to locate their targets ?

A

Smart weapons

19
Q

Complex system that can assume almost complete responsibility for a task without
human input ?

A

Autonomous system

20
Q

Computers at War : Cyber Warfare ?

A

By attacking computer networks the enemy can cripple
Telecommunications , Power grids
and Water and gas supplies