0% found this document useful (0 votes)
4 views

Computer Security Worksheet

This worksheet covers key concepts in computer security, including definitions of confidentiality, integrity, availability, and cryptography. It includes various question types such as short answer, multiple choice, true or false, and practical exercises related to security threats, encryption methods, and authentication measures. Additionally, it features a case study on a data breach, prompting students to identify weaknesses and suggest preventive measures.

Uploaded by

Ermias
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer Security Worksheet

This worksheet covers key concepts in computer security, including definitions of confidentiality, integrity, availability, and cryptography. It includes various question types such as short answer, multiple choice, true or false, and practical exercises related to security threats, encryption methods, and authentication measures. Additionally, it features a case study on a data breach, prompting students to identify weaknesses and suggest preventive measures.

Uploaded by

Ermias
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Worksheet

Course: Computer Security


Chapter Covered:

1. Introduction to Computer Security


2. Encryption
3. Public-Key Cryptography and Message Authentication
4. Operating System Security

Section 1: Key Concepts

1. Define the following terms:


a) Confidentiality
b) Integrity
c) Availability
d) Authentication
e) Cryptography
f) Malware

2. Short Answer Questions:


a) What are the primary goals of computer security?
b) Explain the importance of the CIA triad in cybersecurity.
c) What are the common security threats to an operating system?
d) Describe how encryption enhances data security.

Section 2: Multiple Choice Questions (MCQs)

1. Which of the following is NOT a component of the CIA triad?


a) Confidentiality
b) Authentication
c) Integrity
d) Availability

2. What is the primary function of a firewall?


a) Encrypt data transmission
b) Monitor and control network traffic
c) Detect physical intrusions
d) Remove malware from a system
3. Which encryption method uses two different keys for encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Stream cipher

4. A Trojan horse is a type of:


a) Virus
b) Worm
c) Malware
d) Spyware

Section 3: True or False

1. A strong password should contain at least 8 characters, including uppercase, lowercase,


numbers, and special symbols.
2. Digital signatures are used only for encrypting messages.
3. A brute force attack attempts to guess a password by trying all possible combinations.
4. Public-key encryption requires both the sender and receiver to have a shared secret key.

Section 4: Case Study

Scenario: You are an IT security specialist at a company that recently suffered a data breach. The
attackers gained access through weak authentication mechanisms and installed malware on
company servers.

1. Identify three security weaknesses that may have led to this breach.
2. Suggest at least three measures to prevent such incidents in the future.
3. How would you implement authentication measures to enhance security?

Section 5: Practical Exercises

1. Write an example of a strong password and explain why it is secure.

Section 6: Discussion Questions


1. Discuss the advantages and disadvantages of symmetric and asymmetric encryption.
2. How does multi-factor authentication improve security?
3. Why is it important to regularly update operating systems and applications?
4. Explain the role of intrusion detection systems (IDS) in network security.

End of Worksheet

You might also like