Computer Security concept for SEE
Short questions answer of Computer Security
1.
What is Computer Security? (SEE 2073) List its types. (SLC 2067)
Ans: Computer security
is that branch of information technology which deals in the protection of data
on a network or a standalone desktop.
Following are the different types of computer
security.
i) Hardware security
ii) Information security
2)
What is information security? Write the different threats of information
security.
Ans: Information
security is a set of practices intended to keep data secure from unauthorized
access.
Following
are the threats of information security.
i) Virus Threats
ii) Phishing Threats
iii) Hackers
iv) Viral Web Sites
v) Spyware Threats
vi) Social Engineering
3)
What are malicious codes? Give some examples.
Ans: Malicious code is
the kind of harmful computer code or web script designed to create system vulnerabilities.
Following
are the examples of malicious code.
i) Computer viruses
ii) worms
iii) Trojan horses
iv) spyware
4)
Explain the different types of computer virus.
System
or boot infectors
A virus which can infect the operating system. This types of virus hided in external devices like e-mail attachment and USB drive. it can directly infect the Master Boot Record(MBR).
File infectors
These types of virus effect executable file like .EXE and .COM. When executable file corrupt by file infector virus your program is stop functioning.
Stealth Viruses
A stealth virus hides the modifications it makes and
takes up the residence in the memory causing hard to detect them.
Macro
Virus:
A type of computer virus that is encoded as a macro embedded in a document. Macro virus mainly effects application software like MS-Word and Ms-Ecel.
An email virus
comprises of malicious code that is distributed in email messages, and this
code can be activated when a user opens an email attachment, clicks on a link
in an email message, or interacts in a totally different way with the infected
email message.
5)
How malware spreads in your computer system?
Ans: Malware can get onto your computer in a number
of different ways. Here are some common examples:
i) Downloading free software from the Internet that
secretly contains malware
ii) Downloading legitimate software that's secretly
bundled with malware
iii) Visiting a website that's infected with malware
iv) Clicking a fake error message or pop-up window
that starts a malware download
v) Opening an email attachment that contains malware
6)
Write the symptoms of malware.
Ans: Some of the common signs and symptoms of
malware infection are listed below:
i) Slowing down of your computer, programs, and
internet connection
ii) Frequently, the web browser ceases to work
completely
iii) Suddenly, your screen is bombarded with popup
of unwanted advertisements
iv) Unanticipated frequent system or program crashes
v) An unexpected decrease in disk space
vi) Web browser’s homepage has been changed
vii) Redirection to new websites while trying to
access a different website
viii) Unusual programs and messages keep appearing
ix) Programs start running automatically
x) The antivirus program is turned off (disabled)
automatically
xi) Friends complaining of receiving strange and
irrelevant messages from your email
xii) Blocked access to your own system and ransom
demanded to regain access again
7)
How to prevent computer system from
malware?
Ans: Following are the method through which we can
avoid malware
i) Install Anti-Virus/Malware Software.
ii) Keep Your Anti-Virus Software Up to Date.
iii) Run Regularly Scheduled Scans with Your
Anti-Virus Software.
iv) Network should be secure.
v) Don’t click on links within emails
vi) Keep Your Personal Information Safe.
vii) Avoid Open Wi-Fi.
viii) Back Up Your Files.
ix) Use Multiple Strong Passwords.
x) Minimize downloads
xi) Use a firewall
xii) Avoid pirated software
8)
What are security mechanisms? List its examples.
Ans: Security mechanisms are technical tools
and techniques that are used to implement security services. Examples of
common security mechanisms are as follows:
(i)
Authentication systems
(ii) Firewalls
(iii) Cryptography
(iv)
Antivirus software
(v) Backup
System
9)
What is password? List the different methods to make your password strong.
Ans: A password is a string of characters, phrase used to verify a user's identity during the authentication process.
Following are the different methods to make your password
strong.
i) Use passwords of at least eight (8) characters or
more (longer is better).
ii) Use a combination of upper case letters, lower
case letters, numbers, and special characters (for example: !, @, &, %, +)
in all passwords.
iii) Avoid using people’s or pet’s names, or words
found in the dictionary; it’s also best to avoid using key dates (birthdays,
anniversaries, etc.).
iv) Substituting look-alike characters for letters
or numbers is no longer sufficient (for example, “Password” and “P@ssw0rd”).
v) A strong password should look like a series of
random characters.
vi) Never share your password with anyone
vii) Do not just use one password for all your
accounts
viii) Change your password regularly.
10)
What is Biometrics? Write the different components of biometrics.
Ans: Biometrics is the measurement and statistical
analysis of people's unique physical and behavioral characteristics. The technology
is mainly used for identification and access control, or for identifying
individuals who are under surveillance.
Components
of biometric devices include:
i) A reader or scanning device to record the
biometric factor being authenticated.
ii) Software to convert the scanned biometric data
into a standardized digital format and to compare match points of the observed
data with stored data.
iii) A database to
securely store biometric data for comparison.
11)
Write the different types of biometrics with examples.
Ans: Biometric are classified as follows.
Behavioral
Biometrics:
i) It records and tracks the behavioral pattern of
an individual such as
ii) The style of his/her signature
iii) Pitch
iv) Texture of voice
v) Keystroke
Physiological
Biometrics:
This is a rather popular one. It records innate
human characteristics such as:
i) Ear authentication
ii) Eye vein recognition
iii) Facial recognition
iv) Fingerprint recognition
v) DNA matching
12)
Write the advantages and disadvantages of biometrics.
Ans: Biometrics has plenty of advantages and
disadvantages regarding its use, security and other related functions.
Advantages:
i) Hard to fake or steal, unlike passwords.
ii) Ease of use and convenience.
iii) Change little over a user’s life.
iv) Templates take up less storage.
v) It is not transferable.
Disadvantages:
i) It is costly to get
a biometric system up and running.
ii) If the system fails
to capture all of the biometric data, it can lead to failure in identifying a
user.
iii) Databases holding
biometric data can still be hacked.
iv) Errors such as
false rejects and false accepts can still happen.
v) If a user gets
injured, then a biometric authentication system may not work
13)
List the different application area of biometrics.
Ans: Following are the different application areas
of biometrics.
i) Law enforcement
ii) Border control
iii) Healthcare
iv) Internet verification
v) E-commerce
vi) National identity card
vii) ATM
viii) Criminal investigation
14)
What do you mean by firewalls? List its types.
Ans: A firewall is a
network security system designed to prevent unauthorized access to or
from a private network. Following are the types of firewalls.
Hardware
Firewall
A hardware firewall prevents whole network from outside world with the help of single hardware device.
Software Firewall
A software firewall prevents your network’s computers from the internet vulnerabilities
15)
Write the importance of firewalls.
Ans: Following are the importance of firewalls.
i) Protects your computer from unauthorized access
ii) Identifying and blocking unwanted content
iii) Helping prevent against worms, viruses, and
malware.
iv) Creates a secure network for multi-person
interaction, such as online video games
v) Helps keep your private information such as
online banking credentials or social security number safe
16)
What is Cryptography? Write its components.
Ans: Cryptography is a process or technique to send message confidentiality from one person to another.
Following are the components of cryptography.
i) Plaintext
ii) Cipher text
iii) Encryption
iv) Decryption
17) Write the difference between Encryption and
Decryption.
Ans: Following are the difference between encryption
and decryption.
Encryption |
Decryption |
Encryption
is the process of converting normal message into meaningless message. |
While
decryption is the process of converting meaningless message into its original
form. |
Encryption
is the process which takes place at sender’s end. |
It is the process from the receives side called description. |
It convert the plain text into cipher text. |
It convert the cipher text into plain text. |
18)
What is Cryptographic key? List the different types of cryptographic keys.
Ans: A cryptographic key is a string of bits used by
a cryptographic algorithm to transform plain text into cipher text or vice
versa.
Following are the different types of cryptographic
keys.
i)
Symmetric Key:
Symmetric-key encryption are algorithms which use
the same cryptographic keys for both encryption of plaintext and decryption of
cipher text.
ii)
Asymmetric Key:
Asymmetric encryption uses 2 pairs of key for
encryption. Public key is available to anyone while the secret key is only made
available to the receiver of the message. There are
following two types of asymmetric keys.
Public
Key:
Public key cryptography is an encryption system which is based on two pairs of
keys. To encrypt messages for a receiver public keys are used.
Private
Key: The private key can be used with asymmetric encryption because you can use the same key to encrypt and decrypt data.
19)
Define antivirus. Give some examples.
Ans: Antivirus
software is a type of utility software used for scanning and
removing viruses/malware from your computer.
Some
popular antivirus software includes:
AVG, MacAfee,
Norton Anti-virus (NAV), PC-Cillin, Panda,
NOD 32, Kaspersky, Symantec, K7, Avast, Quick Heal, Bitdefender, Avira etc.
20)
Write the advantages of antivirus software.
Ans: Following are the advantages of antivirus
software.
i) Protection from viruses and their transmission
ii) Block spam and ads
iii) Defense against hackers and data thieves
iv) Ensures protection from removable devices
v) Protects your data and files
vi) Firewall protection from spyware and phishing
attacks
vii) Limit the access of websites to enhance web
protection
viii) Keeping an eye on kids
ix) Protects your password
21)
What do you mean by backup? List the medium of data backup.
Ans: A backup is a copy of one or more files created as an alternative if the original data is lost or becomes unusable.
Following
are the medium of data backup.
i) USB Flash Drives
ii) External Hard Drives
iii) Cloud storage
22) What is cloud storage? Give some examples.
Ans: Cloud storage is a cloud computing model in
which data is stored on remote servers accessed from the internet, or
"cloud."
Following are the examples of cloud storage.
i) Dropbox
ii) Google Drive
iii) Microsoft OneDrive
iv) iCloud
23)
What is hardware security? (SLC 2066, SLC supplementary 2066) Write different
measures to protect the computer hardware. (SLC 2065, 2071, supp 2070, SEE 2073 Supp.)
Ans: Hardware security refers to the protection of
computers from physical loss and damage. Security of computer from theft,
physical damage etc. is referred to hardware security.
There
are various ways by which we can protect them as here under:
i) Regular maintenance
ii) Dust free environment
iii) Air condition system
iv) Protection from fire
v) Use power protection devices. (volt guard, spike
guard, UPS)
vi) Insurance
vii) Ventilation and light
24)
Write the importance of power protection device (UPS) to protect computer system. (SEE 2074)
Ans: The importance of power protection device to
protect computer system are:
i) To protect the hardware against damage from
unexpected power failures.
ii) To protect files and programs that are damaged by a sudden power outage.
iii) Provide alarms on certain error conditions.
iv) Monitoring and logging of the status of the
power supply.
v) Automatically shuts down equipment during long
power outages
25)
Why Backup is Essential?
Ans: Following are essential reasons of backup.
i) Quick Access to Files
ii) Protection Against Power Failures
iii) Added Anti-Virus Protection
iv) Safeguard Against Failed Hard Drive
v) Recovery if Operating System Fails
26)
How does virus Transfer? Or What are the medium of transmission of computer virus.
(SLC 2071)
Ans: Viruses are transferred from following mode.
i) Opening attachments or links from unknown or
spoofed emails
ii) Downloading software from malicious sites
iii) Social media
iv) Online Ads
v) Pirated software
vi) Virus infected pen drive
vii) Playing lots of game on computer.
No comments:
Post a Comment