Computer for SEE and NEB

It is a complete SEE and NEB solution for computer science. It includes Computer Fundamentals, Database (SQL), Programming in C QBASIC, CSS, JavaScript, and PHP for beginners.

Breaking

Post Top Ad

Your Ad Spot

Thursday, February 10, 2022

Computer Security concept for SEE

 Computer Security concept for SEE



Computer Security concept for SEE



Introduction:

As we rely more on technology in our daily lives, it is crucial to understand computer security concepts to keep ourselves and our data safe. As a SEE student, you might have questions about computer security and how to protect your digital life. In this blog post, we will answer some common computer security questions and help you understand the concept of computer security.


Short questions answer of Computer Security


1. What is Computer Security? (SEE 2073) List its types.  (SLC 2067)

Ans: Computer security is that branch of information technology which deals in the protection of data on a network or a standalone desktop.

Following are the different types of computer security.

i) Hardware security

ii) Information security

 

2) What is information security? Write the different threats of information security.

Ans: Information security is a set of practices intended to keep data secure from unauthorized access. 

Following are the threats of information security.

i) Virus Threats

ii) Phishing Threats

iii) Hackers

iv) Viral Web Sites

v) Spyware Threats

vi) Social Engineering

 

3) What are malicious codes? Give some examples.

Ans: Malicious code is the kind of harmful computer code or web script designed to create system vulnerabilities.  

Following are the examples of malicious code.

i) Computer viruses

ii)  worms                 

iii) Trojan horses                 

iv) spyware

 

4) Explain the different types of computer virus.

System or boot infectors

A virus which can infect the operating system. This types of virus hided in external devices like e-mail attachment and USB drive. it can directly infect the Master Boot Record(MBR). 

File infectors

These types of virus effect executable file like .EXE and .COM. When executable file corrupt by file infector virus your program is stop functioning.

Stealth Viruses

A stealth virus hides the modifications it makes and takes up the residence in the memory causing hard to detect them.

Macro Virus:

A type of computer virus that is encoded as a macro embedded in a document. Macro virus mainly effects application software like MS-Word and Ms-Ecel.

 Email virus

An email virus comprises of malicious code that is distributed in email messages, and this code can be activated when a user opens an email attachment, clicks on a link in an email message, or interacts in a totally different way with the infected email message.

 

5) How malware spreads in your computer system?

Ans: Malware can get onto your computer in a number of different ways. Here are some common examples:

i) Downloading free software from the Internet that secretly contains malware

ii) Downloading legitimate software that's secretly bundled with malware

iii) Visiting a website that's infected with malware

iv) Clicking a fake error message or pop-up window that starts a malware download

v) Opening an email attachment that contains malware

 

6) Write the symptoms of malware.

Ans: Some of the common signs and symptoms of malware infection are listed below:

i) Slowing down of your computer, programs, and internet connection

ii) Frequently, the web browser ceases to work completely

iii) Suddenly, your screen is bombarded with popup of unwanted advertisements

iv) Unanticipated frequent system or program crashes

v) An unexpected decrease in disk space

vi) Web browser’s homepage has been changed

vii) Redirection to new websites while trying to access a different website

viii) Unusual programs and messages keep appearing

ix) Programs start running automatically

x) The antivirus program is turned off (disabled) automatically

xi) Friends complaining of receiving strange and irrelevant messages from your email

xii) Blocked access to your own system and ransom demanded to regain access again

 

7)  How to prevent computer system from malware?

Ans: Following are the method through which we can avoid malware

i) Install Anti-Virus/Malware Software.

ii) Keep Your Anti-Virus Software Up to Date.

iii) Run Regularly Scheduled Scans with Your Anti-Virus Software.

iv) Network should be secure.

v) Don’t click on links within emails

vi) Keep Your Personal Information Safe.

vii) Avoid Open Wi-Fi.

viii) Back Up Your Files.

ix) Use Multiple Strong Passwords.

x) Minimize downloads

xi) Use a firewall

xii) Avoid pirated software

 

8) What are security mechanisms? List its examples.

Ans: Security mechanisms are technical tools and techniques that are used to implement security services.  Examples of common security mechanisms are as follows:

 (i) Authentication systems

(ii) Firewalls

(iii) Cryptography

 (iv) Antivirus software

 (v) Backup System

 

9) What is password? List the different methods to make your password strong.

Ans: A password is a string of characters, phrase used to verify a user's identity during the authentication process.

Following are the different methods to make your password strong.

i) Use passwords of at least eight (8) characters or more (longer is better).

ii) Use a combination of upper case letters, lower case letters, numbers, and special characters (for example: !, @, &, %, +) in all passwords.

iii) Avoid using people’s or pet’s names, or words found in the dictionary; it’s also best to avoid using key dates (birthdays, anniversaries, etc.).

iv) Substituting look-alike characters for letters or numbers is no longer sufficient (for example, “Password” and “P@ssw0rd”).

v) A strong password should look like a series of random characters.

vi) Never share your password with anyone

vii) Do not just use one password for all your accounts

viii) Change your password regularly.

 

10) What is Biometrics? Write the different components of biometrics.

Ans: Biometrics is the measurement and statistical analysis of people's unique physical and behavioral characteristics. The technology is mainly used for identification and access control, or for identifying individuals who are under surveillance.

Components of biometric devices include:

i) A reader or scanning device to record the biometric factor being authenticated.

ii) Software to convert the scanned biometric data into a standardized digital format and to compare match points of the observed data with stored data.

iii) A database to securely store biometric data for comparison.

 

11) Write the different types of biometrics with examples.

Ans: Biometric are classified as follows.

Behavioral Biometrics: 

i) It records and tracks the behavioral pattern of an individual such as

ii) The style of his/her signature

iii) Pitch

iv) Texture of voice

v) Keystroke

 

Physiological Biometrics: 

This is a rather popular one. It records innate human characteristics such as:

i) Ear authentication

ii) Eye vein recognition

iii) Facial recognition

iv) Fingerprint recognition

v) DNA matching

 

12) Write the advantages and disadvantages of biometrics.           

Ans: Biometrics has plenty of advantages and disadvantages regarding its use, security and other related functions.

Advantages:

i) Hard to fake or steal, unlike passwords.

ii) Ease of use and convenience.

iii) Change little over a user’s life.

iv) Templates take up less storage.

v) It is not transferable.

 

Disadvantages:

i) It is costly to get a biometric system up and running.

ii) If the system fails to capture all of the biometric data, it can lead to failure in identifying a user.

iii) Databases holding biometric data can still be hacked.

iv) Errors such as false rejects and false accepts can still happen.

v) If a user gets injured, then a biometric authentication system may not work 

 

13) List the different application area of biometrics.

Ans: Following are the different application areas of biometrics.

i) Law enforcement

ii) Border control

iii) Healthcare

iv) Internet verification

v) E-commerce

vi) National identity card

vii) ATM

viii) Criminal investigation

 

14) What do you mean by firewalls? List its types.

Ans: A firewall is a network security system designed to prevent unauthorized access to or from a private network. Following are the types of firewalls.

Hardware Firewall

A hardware firewall prevents whole network from outside world with the help of single hardware device. 

Software Firewall

A software firewall prevents your network’s computers from the internet vulnerabilities


15)  Write the importance of firewalls.

Ans: Following are the importance of firewalls.

i) Protects your computer from unauthorized access

ii) Identifying and blocking unwanted content

iii) Helping prevent against worms, viruses, and malware.

iv) Creates a secure network for multi-person interaction, such as online video games

v) Helps keep your private information such as online banking credentials or social security number safe

 

16) What is Cryptography? Write its components.

Ans: Cryptography is a process or technique to send  message confidentiality from one person to another.

Following are the components of cryptography.

i) Plaintext

ii) Cipher text

iii) Encryption

iv) Decryption

17) Write the difference between Encryption and Decryption.

Ans: Following are the difference between encryption and decryption.

Encryption

Decryption

Encryption is the process of converting normal message into meaningless message.

While decryption is the process of converting meaningless message into its original form.

Encryption is the process which takes place at sender’s end.

It is the process from the receives side called description.

It convert the plain text into cipher text.

It  convert the cipher text into plain text.

 

18) What is Cryptographic key? List the different types of cryptographic keys.

Ans: A cryptographic key is a string of bits used by a cryptographic algorithm to transform plain text into cipher text or vice versa. 

Following are the different types of cryptographic keys.

i) Symmetric Key:

Symmetric-key encryption are algorithms which use the same cryptographic keys for both encryption of plaintext and decryption of cipher text.

ii) Asymmetric Key:

Asymmetric encryption uses 2 pairs of key for encryption. Public key is available to anyone while the secret key is only made available to the receiver of the message. There are following two types of asymmetric keys.

Public Key: Public key cryptography is an encryption system which is based on two pairs of keys. To encrypt messages for a receiver public keys are used.

Private Key:  The private key can be used with asymmetric encryption because you can use the same key to encrypt and decrypt data.

 

19) Define antivirus. Give some examples.

Ans:    Antivirus software is a type of utility software used for scanning and removing viruses/malware from your computer.

Some popular antivirus software includes:

AVG,  MacAfee,  Norton Anti-virus (NAV), PC-Cillin, Panda, NOD 32,  Kaspersky, Symantec,  K7, Avast, Quick Heal, Bitdefender,    Avira etc.

 

20) Write the advantages of antivirus software.

Ans: Following are the advantages of antivirus software.

i) Protection from viruses and their transmission

ii) Block spam and ads

iii) Defense against hackers and data thieves

iv) Ensures protection from removable devices

v) Protects your data and files

vi) Firewall protection from spyware and phishing attacks

vii) Limit the access of websites to enhance web protection

viii) Keeping an eye on kids

ix) Protects your password

 

21) What do you mean by backup? List the medium of data backup.

Ans: A backup is a copy of one or more files created as an alternative if the original data is lost or becomes unusable.

Following are the medium of data backup.

i) USB Flash Drives

ii) External Hard Drives

iii) Cloud storage

 

22) What is cloud storage? Give some examples.

Ans: Cloud storage is a cloud computing model in which data is stored on remote servers accessed from the internet, or "cloud." 

Following are the examples of cloud storage.

i) Dropbox

ii) Google Drive

iii) Microsoft OneDrive

iv) iCloud

 

23) What is hardware security? (SLC 2066, SLC supplementary 2066) Write different measures to protect the computer hardware.  (SLC 2065, 2071, supp 2070, SEE 2073 Supp.)

Ans: Hardware security refers to the protection of computers from physical loss and damage. Security of computer from theft, physical damage etc. is referred to hardware security.

There are various ways by which we can protect them as here under:

i) Regular maintenance

ii) Dust free environment

iii) Air condition system

iv) Protection from fire

v) Use power protection devices. (volt guard, spike guard, UPS)

vi) Insurance

vii) Ventilation and light

 

24) Write the importance of power protection device (UPS)  to protect computer system. (SEE 2074)

Ans: The importance of power protection device to protect computer system are:

i) To protect the hardware against damage from unexpected power failures.

ii) To protect files and programs that are damaged by a sudden power outage.

iii) Provide alarms on certain error conditions.

iv) Monitoring and logging of the status of the power supply.

v) Automatically shuts down equipment during long power outages

 

25) Why Backup is Essential?

Ans: Following are essential reasons of backup.

i) Quick Access to Files

 ii) Protection Against Power Failures

iii) Added Anti-Virus Protection

 iv) Safeguard Against Failed Hard Drive

v) Recovery if Operating System Fails

 

26) How does virus Transfer? Or What are the  medium of transmission of computer virus.  (SLC 2071)

Ans: Viruses are transferred from following mode.

i) Opening attachments or links from unknown or spoofed emails

ii) Downloading software from malicious sites

iii) Social media

iv) Online Ads

v) Pirated software

vi) Virus infected pen drive

vii) Playing lots of game on computer.


Conclusion:

In conclusion, computer security is a critical aspect of our digital lives, and as a SEE student, it is essential to understand its importance and take proactive measures to protect ourselves from potential cyber threats. By understanding the basics of computer security, such as creating strong passwords, avoiding suspicious links and downloads, and regularly updating software, SEE students can ensure the safety of their data and become responsible digital citizens. Remember, it is always better to be safe than sorry when it comes to computer security, so stay vigilant and take the necessary precautions.


You can also Read:




No comments:

Post a Comment

Post Top Ad

Your Ad Spot

Pages