0% found this document useful (0 votes)
32 views

Tutorial - Computer Security

This document provides a tutorial on computer and society security, privacy, and ethics. It covers topics such as computer security risks, types of hackers and crackers, cyber extortionists vs cyberterrorists, types of internet and network attacks, antivirus programs, tips to prevent infections, botnets and denial of service attacks, backdoors and spoofing, firewalls, hardware theft and vandalism, software theft, computer ethics, ways to safeguard personal information, information privacy, and phishing. The document contains 15 multiple choice questions to test understanding of these concepts.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

Tutorial - Computer Security

This document provides a tutorial on computer and society security, privacy, and ethics. It covers topics such as computer security risks, types of hackers and crackers, cyber extortionists vs cyberterrorists, types of internet and network attacks, antivirus programs, tips to prevent infections, botnets and denial of service attacks, backdoors and spoofing, firewalls, hardware theft and vandalism, software theft, computer ethics, ways to safeguard personal information, information privacy, and phishing. The document contains 15 multiple choice questions to test understanding of these concepts.
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Tutorial – Computer and Society Security Privacy & Ethics

Name: Date:

No Questions Marks
01 What is a computer security risk 2 marks
Event or action that causes loss of or damage to computer system.

02. Explain what is Hacker, Crackers? 4 marks


Hacker- someone who accesses a computer or network illegally.
Crackers- someone who accesses a computer or network illegal with the intent
of destroying data, stealing information or other malicious action.

03. What is Cyber extortionist vs Cyberterrorist 4 marks


Cyber extortionist is someone who uses email as a vehicle for extortion while
Cyberterrorist is someone who uses the internet or network to destroy or
damage the computers for politics reasons.

04. List at least 4 types of the Internet and network attacks 4 marks
1) Virus
2) Worm
3) Rootkit
4) Trojan horse

05. What is an antivirus program? 2 marks


Identifies and removes computer viruses and protect from worms, Trojan horse,
and spyware.

06. What are some tips for preventing virus, worm, and Trojan horse infections? 6 marks
1) Never start a computer with removable media inserted
2) Install an antivirus program on all of computers
3) Install a personal firewall program.
4) Check all downloaded programs for Trojan horses.

07. What are a botnets, denial of service attack, back door and spoofing? 4 marks
Botnets is a group of compromised computers connected to a network such as
the internet that are used as part of a network that attacks others networks,
usually for nefarious purpose. A denial of service attack is an assault which
disrupts computer access to internet. Backdoor is a program or set od
instructions in a program that allow users to bypass security controls. Spoofing
is a technique intruders use to make their network appear legitimate to a victim
computer.
08. What are a back door and spoofing? 4 marks
Backdoor is a program or set of instructions in a program that allow users to
bypass security controls. Spoofing is a technique intruders use to make their
network appear legitimate to a victim computer.

09. What is a firewall? 2 marks


Security system consisting of hardware and software that prevents unauthorized
intrusion.

10. What are hardware theft and hardware vandalism? 4 Marks


Hardware theft is an act of stealing computer equipment and Hardware
vandalism is an act of defacing or destroying computer equipment.

11. What is software theft? 2 Marks


An act of stealing , copying software, or intentionally erasing programs.

12. What are computer ethics? 2 Marks


Moral guidelines that govern use of computers and information system.

13. What are some ways to safeguard personal information? List any 4. 4 Marks
1) Install a cookie manager to filter cookies
2) Do not reply to spam for any reason
3) Install a personal firewall
4) Avoid shopping club and buyers club

14. What is information privacy? 2 Marks


Right of individuals and companies to deny or restrict collection and use of
information about them.

15. What is phishing? 2 Marks


Scam in which a perpetrator sends an official looking e-mail that attempts to
obtain your personal and financial information.

You might also like