Tuesday, May 28, 2024

Chapter-4 [Computer Security]

Answer the following questions

  1. What is computer security? What are the major areas of computer security?
    The protection of computer hardware and software from being damaged from intentional and accidental harms is called computer security.
    The major areas of computer security are:
    i. Hardware Security
    ii. Software Security
  2. What is security threats to computer system? List their types.
    Security threats to computer system refers to anything that causes the loss or corruption of data, information or even the physical damage of the hardware devices.
    Its types are:
    i. Physical Threats
    ii. Non-physical ThreatsExample includes: Virus and malicious codes, ransomware, phishing attacks, social engineering attacks, Denial of Services (DoS) attacks etc.
  3. What is computer virus? Computer virus is a man made destructive programs that disturbs the normal functioning of the computer and damages the file, folder, programs and even system.
  4. Write down any four symptoms of computer virus.
    Following are the symptoms of computer virus.
    i. Slow booting of the computer.
    ii. Changes in the size of files .
    iii. Loss of files and folders.
    iv. Programs being hang frequently.
    v. Frequent re-starting of a computer.
    vi. Opening of program takes more time than usual.
  5. How can you prevent your computer from being infected by computer virus? List any six of them.
    i. Install antivirus software and update it regularly.
    ii. Scan the computer for viruses regularly.
    iii. Stop using pirated software.
    iv. Do not open suspicious links and email-attachments.
    v. Scan your portable storage device before using it.
    vi. Do not download files from untrusted website.
  6. List any four methods of transferring computer virus from one computer to another.
    Computer virus can be transmitted from one computer to another through various methods. Some of them are mentioned below.
    i. By using pirated software.
    ii. By sharing files using infected portable storage devices like pen drive, CD/DVD etc.
    iii. By downloading files from untrusted websites.
    iv. By opening virus infected emails and attachments.
  7. What is computer worm? Define trojan horse.
    Computer Worm:
    The malicious code that do not hide in any files and spread from one computer to another while exchanging files through emails, internet and portable storage devices is called computer worms.
    Trojan Horse:
    The malicious destructive program that pretends to be useful program but performs malicious actions like formatting disks, slowing down a computer, destroying data is called trojan horse. Trojan Horse does not replicate.
  8. What is information (software) security?
    The protection of data, information or program from being damaged or lost intentionally or accidently is called software security.
  9. List any five information security measures.
    Following are the five information security measures:
    i. Authentication
    ii. Firewall
    iii. Cryptography: Encryption and Decryption
    iv. Back up
    v. Antivirus Software
  10. What is authentication? What ae the two common authentication tools?
    Authentication is the process of identifying whether the person is authorized or not for accessing data, information or software in a computer.
    The two authentication tools are:
    i. Password
    ii. Bio metric
  11. What is password? Write any two importance of password protection.
    A secret word or a sequence of characters that allows a user to access file, folder, software or computer system is known as password.
    The importance of password protection are:
    i. It allows you to protect your files, folder and programs.
    ii. It prevents unauthorized people to access data, file and system.
  12. What is cryptography?
    Cryptography refers to the method of protecting the data, information by converting the content using codes into format that is unreadable to an unauthorized user. The converted codes can be accessed only by the intended user.
  13. Define encryption, decryption and cipher text.
    The process of converting the original message into the format that is unreadable (cipher text) to unauthorized user is called encryption.
    The process of converting the cipher text into its original message so that intended user can read and understand it is called decryption.
    Cipher Text:
    The unreadable text or scrambled text which are not understandable is called cipher text.
  14. What is firewall? What are its types?
    A firewall is a software security measure that prevents network from unauthorized access. It works as a barrier between the computer and the internet.
    Types of firewall:
    i. Hardware Firewall
    ii. Software Firewall
  15. What is antivirus? Give any four examples of antivirus.
    Antivirus is a program that detects and removes computer viruses.
    Following are the examples of antivirus software.
    i. Kaspersky Antivirus
    ii. Norton Antivirus
    iii. AVG Antivirus
    iv. Avast Antivirus
  16. What is backup? Why is it important?
    The process of making duplicate copy of an original data and software is called backup.
    It is important because it allows us to retrieve the data and software which are damaged or lost due to accidental or intentional harms.
  17. What is hardware security? List the measures to protect your hardware devices.
    The protection of computer hardware from being damaged by intentional and accidental harm is called hardware security.
    Following are the measures to protect computer hardware.
    i. Protection from theft
    ii. Protection from dust.
    iii. Using power protection devices.
    iv. Using CC TV camera
    v. Insurance
    vi. Regular Maintenance
    vii. Protection from fire
    viii. Using air conditioning system
  18. What is power protection device? Give any two examples.
    The hardware devices that protects the computer hardware form being damaged by frequent power or voltage fluctuations is called power protection devices.
    Examples includes : Volt Guards, UPS, Spike Guards, Constant Voltage Transformers (CVT) etc.
    19. What is the role of UPS and Volt guard in computer security?
    The role of UPS is to supply backup electric power to the computer system when there is a power failure and prevents from hardware being damaged. The role of Volt guard is to supply constant voltage to the computer system and prevents it from being damaged due to frequent voltage fluctuations.


Please enter your comment!
Please enter your name here