Computer & Information Science - Computer Security (Group 7)

0.0(0)
studied byStudied by 3 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/25

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

26 Terms

1
New cards

What is information security?

Information security is the numerous techniques and policies implemented to protect data from unauthorized access and modification.

2
New cards

What is cyber security?

Cybersecurity is the protection of computer systems and networks from attack by malicious actors that may result in unauthorized information disclosure, theft of, or damage to hardware, software, or data.

3
New cards

What makes information security important?

Information security is important as it prevents access to and modification of data from unauthorized persons who could sometimes have malicious intentions.

4
New cards

True or False?
Cybersecurity deals with the protection of DIGITAL data and information whereas Information security deals with safeguarding your information assets that are both PHYSICAL and DIGITAL

True

5
New cards

Can the terms "computer security" and "cyber security" be used interchangeably?

Yes because most information is stored electronically and is accessible via the Internet, which therefore enforces the importance of protection from malicious users both digitally and physically.

6
New cards

What are the three qualities used to evaluate and address issues risen by information security?

Confidentiality, Availability & Integrity

<p>Confidentiality, Availability &amp; Integrity</p>
7
New cards

What is confidentiality?

Confidentiality is the assurance that information is not disclosed to unauthorized persons, processes, or devices at any given time.

8
New cards

What is integrity?

Integrity is assurance that any information provided is accurate and trustworthy.

9
New cards

What is availability?

Availability is a guarantee of reliable access to the information by AUTHORIZED people. This is ensuring that when information is required by such users, it is readily available to them.

10
New cards

True or False?
Protection of your account balance by the bank the protection of your health and personal information within hospitals are some scenarios where information confidentiality comes into play.

True

11
New cards

Is the following an example of integrity, confidentiality or availability?

Ensuring bank balance can only be modified by appropriate users via appropriate mechanisms.

Integrity

12
New cards

True or False?

Hardware problems and network attacks can cause an information availability problem.

True

13
New cards

True or False?

User authentication verifies the identity of a user attempting to gain access to a network or computing resource by authorizing a human-to-machine transfer of credentials during interactions on a network to confirm a user's authenticity.

True

14
New cards

What are the three general types of authentication credentials?

1. Something the user knows such as:

- Username and password

- A PIN (Personal Identification Number)

2. Something the user possesses such as:

- Identification card with a magnetic strip

- smart card with an embedded memory chip.

3. Biometrics (Physical Traits) such as:

- fingerprints, retina pattern, or voice pattern.

15
New cards

Which is the most expensive authentication method to implement?

Biometrics

16
New cards

1. "The password must be six characters or longer."

2. "It must contain at least one uppercase and one lowercase letter."

3." It must contain at least one digit."

4. "It must contain at least one special character, such as ! or %."

The guidelines above are known collectively as:

The Password Criteria

17
New cards

What is CAPTCHA?

CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a system used to:

1. Differentiate humans from computers in order to ensure that the information provided through a web form has been filled in by a person as opposed to a computer program.

2. Prevent spam or inappropriate material.

18
New cards

A program that grants unauthorized access to a software system to any person who knows it exists is known as:

A Back Door

19
New cards

The term "secret writing" is where the professional term _____________________ derived from.

Cryptography
Cryptography is a method of protecting information and communications through the use of codes, so that only those for whom the information is intended can read and process it.

20
New cards

How would you describe encryption and decryption?

1. Encryption is the process of converting ordinary text (known as plaintext) into cryptography terminology (a form that is unreadable). This form is known as ciphertext.

2. Decryption reverses this process, translating ciphertext into plaintext. A cipher is an algorithm used to perform a particular type of encryption and decryption.

21
New cards

Any program code that explicitly attempts to bypass appropriate authorization safeguards and/or perform unauthorized functions.

A Malicious Code, also known as Malware

22
New cards

What is a virus?

A program that embeds itself in another program. This "infected" file is referred to as the virus host. When the host is executed, the virus code runs as well.

23
New cards

What is a WORM?

WORM is a standalone program that self-replicates, but does not require a host program to infect the computer. A worm tends to cause problems on the networks it uses to send copies of itself to other systems, often by consuming bandwidth.

<p>WORM is a standalone program that self-replicates, but does not require a host program to infect the computer. A worm tends to cause problems on the networks it uses to send copies of itself to other systems, often by consuming bandwidth.</p>
24
New cards

True or False?
A worm requires a host program whereas a virus does not

False

25
New cards

What problems does a worm cause on networks?

Consumes bandwidth.

26
New cards

True or False

The difference between a virus and a WORM is that a virus tends to cause problems on a particular computer by corrupting or deleting files whereas WORM tends to send copies of itself to other computers on the same network

True