1. Very short answer questions
a. Define computer security?
Ans: A computer security refers to the protection of computer system and information from damaged, theft, misuse or unauthorized access. It is also known as cybersecurity or IT security.
b. What is information Security?
Ans: Information security, often referred to as InfoSec, is the practice of protecting unauthorized access , use, disclosure, disruption, modification, inspection, recording or destruction of information.
c. Define virus threats.
Ans: A virus threat refers to a type of malicious software (malware) designed to replicate itself and spread from one computer to another.
d. List any two common types of security threats.
Ans: Two common types of security threats are technical failure and physical damages.
e. Define software security.
Ans: Software security means protecting the software, programs, files and data from attackers, hackers.
f. What is unavoidable part in authentication system?
Ans: The unavoidable part in authentication system are password and biometrics.
g. Write about spyware threats.
Ans: Spyware is a computer program that monitor’s online activities without users consent for profit or theft of personal information. Eg finspy, regain, DARKHOTEL.
h. Define password.
Ans: A password is a string of characters used to authenticate a user on a computer system.
i. Define biometrics.
Ans: Digitally encoding physical attributes of a users to gain access to data or computer system is called biometrics. Example of biometrics are fingerprint, voice recognition, facial recognition etc.
j. Who is Hacker?
Ans: A hacker is an individual who uses their technical knowledge and skills to gain unauthorized access to computer systems, networks, or data.
k. Who implemented the finger print login system for the first time?
Ans: Apple implemented the finger print login system for the first time.
l. Define Firewall.
Ans: A Firewall is the network security systems that monitors and controls the traffic flow between the internet and private network.
m. What is cryptography?
Ans: Cryptography is the technique of securing information through the use of codes so that only the intended person can understand and process it.
n. What are phishing threats?
Ans: Phishing threats is an illegal activity through which phishers attempts to steal sensitive , financial or personal data by means of fraudulent emails or instant messages.
o. What is Antivirus Software?
Ans: A software program designed to detect and remove threats from the computer system like viruses, malwares, worms, trojan horse etc. is called antivirus software. Some of the popular antivirus software are McAfee, Avast, NOD32, AVG.
p. What is Backup?
Ans: A backup is a copy of important data files and documents in another locations.
q. What is hardware security?
Ans: Hardware security is the protection given to the various hardware devices used in the computer system from the accidental or intentional harm.
2. Short answer questions.
a. Explain the three objectives of information Security.
Ans: Information Security programs are built around three objectives, commonly known as CIA- Confidentiality, Integrity, Availability.
i. Confidentiality
Confidentiality means only authorized users can access the data resources and information. Data encryption is a good example to ensure confidentiality.
ii. Integrity
Integrity is the accuracy and completeness of data. Only authorized users should be able to modify the data when needed.
iii. Availability
Availability means information must be available when needed. Availability guarantees the reliable and constant access to our sensitive data by authorized people.
b. List and explain any four computer threats.
Ans: The four computer threats are:
Virus threats: A computer virus is a program designed to disturb the normal functioning of the computer without the permission of the user. eg. morris worm, ILOVEYOU, code red and code redII.
Spyware threats: Spyware is a computer program that monitor’s online activities without users consent for profit or theft of personal information. Eg finspy, regain, DARKHOTEL.
Hackers: A hacker is an individual who uses their technical knowledge and skills to gain unauthorized access to computer systems, networks, or data. The term “hacker” can have both positive and negative intention, depending on the context and the intent behind the hacking activities.
Phishing threats: Phishing threats is an illegal activity through which phishers attempts to steal sensitive , financial or personal data by means of fraudulent emails or instant messages.
Trojan horse: A Trojan horse is designed to appear as a legitimate (valid) program in order to gain access to a system. Once activated following installation, Trojans can execute their malicious functions.
Eg cryptolocker, BlackEnergy, ILOVEYOU.
c. Write any four points to protect computer from threats.
Ans:
1. Install an updated versions of antivirus software.
2. Install an updated firewall programs.
3. Use genuine software.
4. Keep backup of important files and folders.
5. Always use strong password.
d. Explain Malicious code with example.
Ans: Malicious code is the harmful computer programming scripts designed to create or exploit system vulnerabilities. Eg bots, ransomeware.
e. What is software security? List any two security measures.
Ans: Software security means protecting the software, programs, files and data from attackers, hackers.
It includes:-
Authentication systems
Biometrics
Firewalls
Cryptography
Antivirus software
Backup system
f. List and explain the types of authentication system.
Ans: Authentication is the process of verifying the identity of a person or device. It assure that right person enter the system and access the right information.
Authentication service has two types:-
– Password: A password is a string of characters used to authenticate a user on a computer system. Password secures the data from unauthorized access.
– Biometrics: Digitally encoding physical attributes of a users to gain access to data or computer system is called biometrics. Example of biometrics are fingerprint, voice recognition, facial -recognition etc.
g. How to make a strong password? Give example
Ans:
- Do not keep password too short.( Must be 8 characters long)
- Change password frequently once or twice in a month.
- Use password with combination of alphabets, numbers, symbols.
- Do not use same password for multiple times.
h. Explain the types of firewalls.
Ans: Hardware- based firewalls: A hardware based firewalls acts as an antivirus like a gatekeeper protecting your server.
Software-based firewalls: Software based firewalls not only monitors the incoming traffic but also can monitor the traffic trying to leave the computer as well.
i. Explain Encryption and Decryption.
Ans: The process of converting plain text to cipher text is called encryption. Only the authorized person can convert the cipher text to plain text.
The process of converting an encrypted message back to its original format is called decryption.
j. Explain why backup of data is needed.
Ans: Backup system is vital to computer security system in order to save the data from being lost or damaged due to accidental or intentional harm. When data and software are lost or damaged then we can easily recover through backup.
k. Explain any four hardware security measures.
Ans: Different hardware security measures are:
Regular maintenance: Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the
problems before they cause several damages.
Insurance: Computer insurance is designed to protect computer from loss, theft, or damage.
Dust free environment: Dust particles can cause the failure of hardware components. Computer room should be free from dust and air pollution.
Protection from fire: Due to faulty wiring, loose connection, smoking in the computer room and overload on power socket can cause fire in the room. Fire extinguisher can minimize this risk.
l. Define UPS. Why is it necessary in computer system?
Ans: Uninterruptable power supply(UPS) is a battery supported protection device which controls the electric voltage and supplies clean and continuous power to the computer system even during the power failure. The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough electric power to the computer system when there is power failure.
3. Write appropriate technical terms for the following.
a. A device which provides electricity during power failure. Ans:UPS(Uninterruptible power supply)
b. Copy of important data and file. Ans: Backup
c. Act of securing information from unauthorized access. Ans: Information Security
d. An electronic machine, which makes our life easier. Ans: Computer
e. A device that gives electricity during power failure. Ans: UPS
f. A device that maintains the temperature of a computer lab. Ans: Air conditioning system
g. A person who tries to access the confidential data of a country. Ans: Hacker
h. It protects the computer from loss, theft or damage. Ans: Computer Insurance
i. It is the process of securing all the hardware parts of computer from theft, loss or physical damage. Ans: Hardware security
j. A software program designed to detect and remove threats like viruses. Ans: Antivirus Software
k. The process of converting the original text (plain text) to coded text(cipher text). Ans: Encryption
l. The process of converting an encrypted message (cipher text) back to its original format (plain text). Ans: decryption
m. A string of characters used for authenticating a user on a computer system. Ans: Password
n. Digitally encoding physical attributes of a user to gain access to data or computer system. Ans: Biometrics