Ch 3- Computer Security
Write the full form of:
i. CIA – Central Intelligence
Agency
ii. APT – Advanced Persistent
Threat
iii. IoT – Internet of Things
iv. DDoS – Distributed Denial of
Service
v. PDF – Portable Document Format
vi. PC – Personal Computer
vii. NAV – Navigation (or Net Asset
Value, depending on context)
viii. UPS – Uninterruptible Power
Supply
Write
technical terms of the following:
a.
The fake attempt to obtain sensitive information. Phishing
b.
The hardware or software for recording the keys pressed on a keyboard. Keylogger
C.
The kind of harmful computer code or web script designed to create syster
vulnerabilities.
Malware
d.
The process of identifying an individual is usually based on a username an
password. Authentication
e.
A memorized secret is used to confirm the identity of a user. Password
f.
A process of performing a variety of tech-enabled activities via virtual
communities and networks.
Social Networking
g.
Theyare uniquely identified by evaluating one or more distinguishing biological
traits. Biometrics
h.
The network security systems monitor and control the traffic flow. Firewall
i.
The technology to encode files or messages. Encryption
j. A small destructive program whose intention is to harm computer software and data. Virus
Very
short answer questions:
a.
What is computer security?
Computer
security is the protection of computer systems and data from unauthorized
access, misuse, damage, or theft.
b. Define hardware security.
Hardware
security refers to protecting the physical components of a computer system from
damage, theft, or unauthorized access.
c. What is data and information security?
Data
and information security involve protecting digital data from unauthorized
access, corruption, or loss.
d. Define Encryption and Decryption.
Encryption: The process of converting plain
text into a coded form to prevent unauthorized access.
Decryption: The process of converting the
coded text back into readable form.
e. What are malicious codes?
Malicious
codes are harmful programs such as viruses, worms, or trojans designed to
damage or disrupt computer systems.
f. Define Firewall with examples.
A
firewall is a network security system that monitors and controls incoming and
outgoing network traffic.
Example:
Windows Defender Firewall, Cisco ASA Firewall.
g. What is biometric verification?
Biometric
verification is the process of confirming an individual’s identity using
biological traits like fingerprints, facial recognition, or iris scans.
Short Answer Questions:
a.
List some points on how we can protect our data.
1.
Use strong passwords and change them regularly.
2.
Install antivirus and keep it updated.
3.
Encrypt sensitive data.
4.
Take regular data backups.
5.
Avoid clicking unknown links or downloading suspicious files.
6.
Use firewalls and secure networks.
b. What is a backup? Why is backup vital to computer security systems?
A
backup is a copy of important data stored separately for recovery in case the
original data is lost or damaged.
It
is vital because it helps restore data after hardware failure, virus attack, or
accidental deletion.
c. Write down any six possible threats to computer security.
1.
Viruses
2.
Worms
3.
Trojan horses
4.
Phishing attacks
5.
Unauthorized access (hacking)
6.
Data theft
d. What is a password? Why is a password used in a computer?
A
password is a secret combination of characters used to verify a user’s
identity.
It
is used to prevent unauthorized access to computer systems and data.
e. What are security threats? Explain any two in brief.
Security
threats are potential dangers that can harm computer systems or data.
Virus: A program that spreads by infecting
files and damages data.
Phishing: A fraudulent attempt to steal
sensitive information through fake emails or websites.
f. Define antivirus software with four examples.
Antivirus
software is a program designed to detect, prevent, and remove malicious
software.
Examples:
Avast, McAfee, Norton, Quick Heal.
g. Write down any four preventive measures for computer hardware security.
1.
Keep computers in a secure, locked area.
2.
Use surge protectors and UPS.
3.
Avoid exposure to dust and moisture.
4.
Label and track all hardware devices.
h. Point out any four computer software security measures.
1.
Install and update antivirus software.
2.
Use strong and unique passwords.
3.
Enable firewalls.
4.
Regularly update software and operating systems.
i. What is software security? Write any four measures of hardware security.
Software
security means protecting programs and data from unauthorized access or damage.
Four
measures of hardware security:
1.
Physical locks on devices.
2.
Use of CCTV monitoring.
3.
Controlled access to computer rooms.
4.
Power backup devices like UPS.
j. What is a power protection device? Write its role in computer security.
A
power protection device (like a UPS or surge protector) protects computers from
sudden power loss or voltage fluctuations.
It
ensures continuous power supply and prevents data loss or hardware damage.
k. Why is it important to protect computer systems from dust?
Dust
can block air vents, cause overheating, and damage internal components such as
fans and hard drives.
Keeping
computers dust-free ensures better performance and longer lifespan.
Model Questions
1.What is computer security?
Computer security is the protection of computer systems, networks, and data from unauthorized access, attacks, and damage.
2. What are the security threats? Explain any two in brief.
Security threats are risks that can harm your
data or systems.
Types of Security threats are :
1. Malware:
This is harmful software designed to damage or disrupt your computer. Examples
include viruses, worms. When malware infects a system, it can steal
information, damage files, or lock users out of their data.
2. Phishing:
This is when attackers try to trick you into giving up sensitive information
like passwords or credit card numbers. They might send fake emails or create
fake websites that look real. If you enter your information, they can use it
for fraudulent activities.
3. What do you mean by malicious code? Name any two malicious code.
Malicious code refers to software designed to harm a computer or its data; two examples are viruses and worms.
4.What are security mechanism and security services?
Security mechanisms are tools and techniques to enforce security policies, while security services are specific functionalities ensuring protection, such as authentication and encryption.
5 What is biometrics? What does biometrics use for user authentication?
Biometrics is the use of unique physical or behavioral characteristics for user authentication, including fingerprints or facial recognition.
6.What is firewall? Why is firewall important in network security?
7. What is the difference between encryption and decryption?
Encryption is the process of converting plain text into cipher text, while decryption is the reverse process of converting cipher text back to plain text.
8 What is antivirus software? Give any two examples of antivirus software.
9. What is data backup? Why is important in computer security?
10 What is hardware security? List any three hardware security measures.
Hardware security involves protecting physical components; three measures are
-biometric access controls,
-hardware tokens, and
-secure boot processes.
11. Why does a computer system need air-conditioned room?
A computer system needs an air-conditioned room to regulate temperature and prevent overheating, ensuring optimal performance and longevity.
12. Why does a computer system need dust free environment?
A dust-free environment is necessary to prevent dust accumulation that can damage internal components and affect a computer system's efficiency.
13. What is a power protection device? Give examples.
A power protection device safeguards against power fluctuations; examples include surge protectors and voltage regulators.
14. What is UPS? What are the functions of UPS?
UPS (Uninterruptible Power Supply) provides backup power during outages, ensuring continuity of operations and protecting against data loss.
15. What is the password? Why is password used in a computer?
A password is a secret code or phrase used for user authentication in a computer, ensuring only authorized individuals access the system.