Day 38-Computer Security Notes
Day 38-Computer Security Notes
Time
-
-
last
-
- -
e -
-
-
#
2
t
TOTAL
QUESTIONS
TODAY: 15
-
FOR MORE UPDATES
UPDATESTODAY.IN
T
DOWNLOAD TODAY’S LECTURE NOTES & WORKSHEET
-
-
S
gub
X
Computer Security
Computer security is also known as cyber security or IT security.
Computer security is a branch of information technology known
as information security, which is intended to protect computers. It
is the protection of computing systems and the data that they
store or access.
Methods to Provide Protection
System Design
It takes advantage of basic hardware and software security
characteristics.
For example, using a system architecture that's able to segment
memory, thus isolating privileged process from no privileged
processes.
Components of Computer Security
Confidentiality: It ensures that data is not accessed by any
unauthorized person.
ABC >
-
⑳
#!
Source of Attack
-
• Downloadable Program
• Cracked Software
• E-mail Attachments
• Internet
• Booting from Unknown CD
• Malware
• Virus
Threats to Computer Security
-
A threat is a potential violation of security and when threat gets
executed, it becomes an attack. Those who execute such threats
D
are known as attackers.
Malware
herm causing
-
>
-
=
Malware stands for malicious software. It is a broad term that
refers to a variety of malicious programs that are used to damage
computer system, gather sensitive information, or gain access to
- -
• These are used for either legal or illegal purpose. Spyware can
transmit personal information to another person's computer
over the internet.
Spyware can harm you in many ways
• Steal your passwords.
• Observe your browsing choices.
• Spawn pop-up windows.
• Send your targeted e-mail.
• Redirect your web browser to phishing pages.
• Report your personal information to distant servers.
• Can alter your computer settings (like web browser, home page
settings or the placement of your desktop icons).
• Can affect the performance of your computer system
~
A. It has a virus
B. It does not have enough memory
C. There is no printer
D. There has been a power surge
E. It need a CD-ROM
2. Junk E-mail is also called ?
-
O
A. Spam
-
-
-
-B. Spoof -
C. Sniffer script
D. Spool -
E. None of these -
3. A person who uses his or her expertise to gain access to
other people computers to get information illegally or do
-
- -
damage is a
-
-
A. Spammer
-
B.
C.
Hacker -
Instant messenger F
D. All of these
-
E. None of these -
4. Vendor created program modifications are called ?
- -
-
-
A. Patches
B. Anti-viruses - Photoshop (Adobe)
-
-
C. Hales
&
-
D. Fixes -
E. Overlaps -
T
5. A ____is anything that can cause harm.
↑
A. Vulnerability
B. Phishing
C. Threat
D. Spoof
E. None of these
-
C
6. A...... is a small program embeded inside of a GIF image.
-
-
-
A. Web bug
B. Cookie -
O
C. Spyware application
-
-
-
D. Spam -
A. Spoofing -
F
B. Phishing
-
-
C. Spamming
D. Buging -
E. None of these -
-
8. The phrase......... describes viruses, worms, trojan horse
---
-
A. Malware -
B. Spam -
①
-
C. Phishing
D. Virus-
E. None of these T
f -
9. Hackers-
often gain entry to a network be -
pretending to
-
-
- >
-
-
be at a legitimate computer
-
A. Spoofing -
B. Forging -
-
C.
D.
IP spoofing -
None of these
system. -
-
10. The ___ of a threat measures its potential impact on a
-
-
A. Vulnerabilities
-
B. Counter measures
=
C.
D.
Degree of harm #
Susceptibility -
E. None of these -
·
11. The main reason to encrypt a file is to
A. Scanned signature -
O
C.
D.
Encrypting information
-
Handwritten signature -
-
-
-
A. Firewall
-
①
-
B. Anti-virus
T
C. Digital signature -
D. Formatting
E. None of these- -
⑧
-
14. A firewall operated by
-
-
O
-
-
-
-o
D. Resource Reservation Protocol (RRP)
E. None of the above
-
DOWNLOAD TODAY’S LECTURE NOTES & WORKSHEET
-
- -
to sub
S
z