Chapter 7: Computer Security Flashcards

1
Q

refer to protecting and securing computers and their related data, networks, software, hardware from unauthorize access.

A

Computer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

4 TYPES OF COMPUTER SECURITY

A
  1. Cyber Security
  2. Information Security
  3. Application Security
  4. Network Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

means of securing our devices from cyber-attacks.

A

Cyber Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

means of protecting our system’s information from theft and unauthorized use.

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 MAIN OBJECTIVE OF INFORMATION SECURITY

A
  • Confidentiality
  • Integrity
  • Availability of Information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

means of securing application and data so they don’t get hacked.

A

Application Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

means of securing a network and protecting the user’s information.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

8 TYPES OF CYBER ATTACKS

A
  1. Denial of Service
  2. Backdoor
  3. Eavesdropping
  4. Phishing
  5. Spoofing
  6. Malware
  7. Social Engineering
  8. Polymorphism
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

attacker disrupt the service of a particular network by sending infinite requests.

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

trojan horse or virus gets installed in our system and start affecting its security along with the main file.

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refer to secretly listening to someone talk without their permission.

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

users are tricked into trusting a person so that they can steal their information.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

is the act of masquerading as a valid entity through falsification of data to access information or resources.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

are malicious software that intrudes into the system.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

involves manipulating users psychologically and extracting confidential or sensitive data

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

are those in which attacker adopts multiple form and changes.

A

Polymorphism