Ch 3- Computer Security
1. Fill in the blanks:
a. Computer plays a very important role in the different fields such as …………and ……….…
b . In a computer, we store important data and information, which can destroyed ………….… , …………..etc. by different factors.
c. The recommended
computer room temperature should be……………..
degree celsius.
d. Due to the faulty wiring or overloaded sockets, short circuits can take place, which can cause ……………and damage the computer system.
e. Power regulating
devices that we can use in computer system are………………..
and…………
f. Computer virus is not a living…………………. it is a computer…………………….
g. Two major
authentication systems are biometric and………………….…..
a) education, health and business b) damaged,
hacked c) 210 to 240 Celsius d) fire e) UPS and volt-guard
f) organism, it is a computer program g) password
2. Tick the best answer
a) Hardware security includes protection of
i. Data ii. information iii. Hard Disk iv. none of them
b)Anti virus detects and removes..... from the system
i/ data ii .malwares iii both i and ii iv. none of them
c)UPS is used to protect computer sytstem from.....
i. power cut ii. power fluctation iii.Both i and ii iv. none of them
d)A strong physical lock system is required to protect computer system from
i/ virus ii. earth quack iii.Theft iv. none of them
e) Backup is a way of
Securing data and information
f)Cryptography is a art of protecting
data
4. Write the technical terms for the following:
a. The software used to scan a computer's memory and disks to detect viruses.
Antivirus
b. A copy of a file which is used in the event of the original file being corrupted.
Backup
c. A battery supported power unit between an external power source and a computer system which supplies clean and continuous power even during power failures.
UPS (Uninterruptible Power Supply)
d. A secret word or phrase that gives a user access to a particular program or system.
Password
e. Art of changing text in unreadable format or code
Encryption
5. Match the following:
a) Backup----------------------------------- Duplicate copy of data
b) Password ----------------------------------- Allows user to access system
c) Scan Disk ----------------------------------- Checks and fixes errors of storage devices
d) Computer Virus ----------------------------------- Software that destroys data
7. Answer the following questions in short:
a What is computer worm?
Computer
worm is aq self-replicating virus that
spreads across networks and can cause harm to computers.
b. What is root kit?
Root kit is a type of malware that hides itself and other malicious
software to gain unauthorized access to a computer.
C. List any two hardware
threats.
Two hardware threats:
- Physical damage to hardware components.
- Theft of hardware devices.
d. What is encryption?
Encryption
is the process of converting data into a
code to prevent unauthorized access.
e What is software
security?
Software
security are measures and practices to
protect software from threats like viruses, malware, and unauthorized access.
f. List any two points
for creating a strong password.
Two points for creating a strong
password:
- Use a mix of letters, numbers, and special characters.
- Make the password long and avoid using easily guessable
information.
8.
a. Define computer security. List any
three hardware and software security measures.
- Computer security is protecting
computers and data from unauthorized access or damage.
- Three Security Measures:
- Hardware:
1. Firewall: Protects against unauthorized network access.
2. Security Cameras: Monitors physical access to computer areas.
3. Lockable Cases: Prevents physical tampering with computer hardware.
- Software:
1. Anti-virus Programs: Detect and remove harmful software.
2. Encryption: Secures data by converting it into unreadable code.
3. Access Control Lists: Limits user permissions to specific data or
applications.
b. What is a power regulating device?
Write the functions of UPS in brief.
- Power Regulating Device is a device
that manages the electrical power supply to ensure stable and consistent
voltage.
- Functions
of UPS (Uninterruptible Power Supply):
1. Provides Backup Power: Supplies power during outages to keep systems
running.
2. Protects Against Surges: Shields equipment from power surges and
spikes.
3. Regulates Voltage: Ensures stable voltage levels to prevent damage.
c. What is a computer virus? Give two
examples of it.
- Computer Virus is a malicious program
that attaches itself to files or programs and spreads to other files, causing
damage or disruption.
- Two Examples:
1. ILOVEYOU Virus: Spread via email and caused widespread damage by
overwriting files.
2. Melissa Virus: Spread through infected email attachments and affected
Microsoft Word documents.
d. Define anti-virus software. Give two
examples of it.
- Anti-virus Software is a program
designed to detect, prevent, and remove malicious software (viruses) from a
computer.
- Two Examples:
1. Norton AntiVirus: Provides real-time protection against viruses and
other threats.
2. McAfee Antivirus: Scans for and removes viruses and malware.
e. What is a backup? Why are backups
vital to data and software security?
- Backup is a copy of important data or
software stored separately from the original.
- Importance:
1. Prevents Data Loss: Allows recovery in case of hardware failure,
accidental deletion, or corruption.
2. Ensures Continuity: Helps maintain operations and recover from
security incidents like ransomware attacks.
f. What is authentication? Explain
biometric in brief.
- Authentication is the process of
verifying the identity of a user or system.
- Biometric: A method of authentication
that uses unique physical characteristics, like fingerprints or facial
recognition, to verify identity.
g. What is data security? Write any two
data security measures.
- Data Security is protecting data from
unauthorized access, alteration, or destruction.
- Two Measures:
1. Encryption: Converts data into a coded format to prevent unauthorized
access.
2. Access Controls: Restricts data access based on user permissions and
roles.
h. Differentiate between encryption and
decryption.
- Encryption: The process of converting
plain text into a coded format to prevent unauthorized access.
- Decryption: The process of converting
the coded format back into plain text to make it readable.
i. What is hardware security? Explain
any two hardware security measures.
- Hardware Security is protecting
physical computer components from theft, or damage.
- Two Measures:
1. Security Locks: Physical locks on computer cases to prevent
unauthorized access.
2. Biometric Scanners: Require physical traits like fingerprints to
access hardware.
Notes
1. Introduction to Computer Security
- Computer Security: Protecting computer systems and data from harm or unauthorized access.
- Importance: Ensures the
safety of sensitive information and maintains the functionality of computer
systems.
2. Types
of Computer Security Threats
- Malware: Malicious software designed to harm or exploit computers.
· Viruses: Attach to files and spread to other computers.
· Worms: Standalone programs that replicate themselves to spread.
· Trojans: Appear as legitimate software but cause damage once installed.
· Spyware: Secretly collects information about a user.
·
Ransomware: Encrypts files and demands
payment for decryption.
- Phishing: Deceptive attempts to obtain sensitive information by pretending to be a trustworthy entity in electronic communications.
- Hacking: Unauthorized
access to computer systems.
3. Security Measures
- Antivirus Software: Detects and removes malware.
- Firewalls: Monitors and controls incoming and outgoing network traffic based on security rules.
- Encryption: Converts data into a coded format to prevent unauthorized access.
- Strong Passwords: Using complex and unique passwords to protect accounts.
- Two-Factor
Authentication (2FA): Adds an extra layer of security by
requiring two forms of verification.
4. Best Practices for Computer Security
- Regular Updates: Keep software and operating systems up to date to protect against vulnerabilities.
- Backup Data: Regularly
back up important data to recover in case of a security breach.
- Be Cautious with Emails: Avoid opening attachments or clicking on links from unknown sources.
- Use Secure Networks: Avoid using public Wi-Fi for sensitive transactions.
- Educate Yourself: Stay informed about the latest security threats and how to protect against them.
5. Responding to Security Incidents
- Identify the Incident: Recognize the signs of a security breach, such as unusual activity or system slowdowns.
- Contain the Threat: Isolate the affected systems to prevent the threat from spreading.
- Eliminate the Cause: Remove malware or fix vulnerabilities causing the security issue.
- Recover Data: Restore data from backups if necessary.
- Learn and Improve: Analyze the incident to prevent future occurrences and improve security measures.
Model Questions
1.What is computer security?
Computer security is the protection of computer systems, networks, and data from unauthorized access, attacks, and damage.
2. What are the security threats? Explain any two in brief.
Security threats are risks that can harm your
data or systems.
Types of Security threats are :
1. Malware:
This is harmful software designed to damage or disrupt your computer. Examples
include viruses, worms. When malware infects a system, it can steal
information, damage files, or lock users out of their data.
2. Phishing:
This is when attackers try to trick you into giving up sensitive information
like passwords or credit card numbers. They might send fake emails or create
fake websites that look real. If you enter your information, they can use it
for fraudulent activities.
3. What do you mean by malicious code? Name any two malicious code.
Malicious code refers to software designed to harm a computer or its data; two examples are viruses and worms.
4.What are security mechanism and security services?
Security mechanisms are tools and techniques to enforce security policies, while security services are specific functionalities ensuring protection, such as authentication and encryption.
5 What is biometrics? What does biometrics use for user authentication?
Biometrics is the use of unique physical or behavioral characteristics for user authentication, including fingerprints or facial recognition.
6.What is firewall? Why is firewall important in network security?
7. What is the difference between encryption and decryption?
Encryption is the process of converting plain text into cipher text, while decryption is the reverse process of converting cipher text back to plain text.
8 What is antivirus software? Give any two examples of antivirus software.
9. What is data backup? Why is important in computer security?
10 What is hardware security? List any three hardware security measures.
Hardware security involves protecting physical components; three measures are
-biometric access controls,
-hardware tokens, and
-secure boot processes.
11. Why does a computer system need air-conditioned room?
A computer system needs an air-conditioned room to regulate temperature and prevent overheating, ensuring optimal performance and longevity.
12. Why does a computer system need dust free environment?
A dust-free environment is necessary to prevent dust accumulation that can damage internal components and affect a computer system's efficiency.
13. What is a power protection device? Give examples.
A power protection device safeguards against power fluctuations; examples include surge protectors and voltage regulators.
14. What is UPS? What are the functions of UPS?
UPS (Uninterruptible Power Supply) provides backup power during outages, ensuring continuity of operations and protecting against data loss.
15. What is the password? Why is password used in a computer?
A password is a secret code or phrase used for user authentication in a computer, ensuring only authorized individuals access the system.