See computer science 2076 edited Computer Security Questions and Answers [20]
See computer science 2076 edited Computer Security Questions and Answers [20] 1. Computer security [SLC 2067] [SLC 2069] [SLC 2070 S] [SEE 2073] [SEE 2074 U] [SEE 2075 S2] The security given to the computer for the protection of hardware, software and data froSee computer science 2076 edited Computer Security Questions and Answers [20] 1. Computer security [SLC 2067] [SLC 2069] [SLC 2070 S] [SEE 2073] [SEE 2074 U] [SEE 2075 S2] The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security. The types of computer security are hardware security and software security. 2. Objectives of computer security a) Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. b) Integrity refers to ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine. c) Availability means that information is accessible by authorized users. 3. Possible threats to computer security [SLC 2069 S] a) Human error c) Computer crime e) Natural disasters b) War and terrorist activity d) Hardware failure 4. Hardware security [SLC 2066] [SEE 2066 S] [SLC 2068 S] [SLC 2071 S] The securing hardware components of the computer system from being damaged or lost due to electrical voltage fluctuation, extreme temperatures, dust, high humidity or mechanical stress is known is hardware security. 5. Some of the hardware security measures [SLC 2064] [SLC 2065] [SEE 2067 S] [SLC 2070 S] [SLC 2071] a) Regular maintenance of computer hardware b) Fire detectors c) Insurance Policy d) Use grille in the windows and use lock in the door to protect from thieves e) Use power protection device to protect computer from power fluctuation. f) Use vacuum cleaner to clean the room and avoid dust g) Protect computer from rain water, moisture and other natural calamities 6. Software security [SLC 2065 S] [SEE 2066 S] The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security. Software prevents the data loss by a) Antivirus software can detect and remove virus from the computer. b) Scan disk checks folders, bad sector and other error of the disk and fix them. c) Software for backup helps in securing the information by keeping backup. 7. Some of the software security measures [SLC 2065] [SLC 2065 S] [SLC 2068] [SLC 2069] [SLC 2071 S] a) keep the backup copy of important data or software b) Scandisk c) Defragmentation d) use Password e) use antivirus software and update frequently f) use firewall to prevent virus. 8. Voltage regulator device A voltage regulator device is an electronic regulator device designed to automatically maintain a constant voltage SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha level.E.g.: UPS, Spike guard, Volt guard, etc. Power protection device The device that provides clean AC power to sensitive electrical equipment are called power protection devices. Examples are: UPS, Volt Guard, Spike guard, etc. Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss. 9. Importance of power protection device [SEE 2074] i) To protect the hardware against damage from unexpected power failures. ii) To protect files and programs being corrupted due to sudden power failure. 10. Surge Protector Surge protector is a device that shields computer and other electronic devices from surges in electric power or transient voltage, that flow from the power supply. 11. UPS (Uninterruptible Power Supply) A UPS is a device that allows computer to keep running for at least a short time when the primary power source is lost. It provides continuous power supply to the computer system and protects them from power surge and voltage fluctuation. 12. Importance of UPS [SLC 2070] The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure. 13. Regular Maintenance [SQE 2075K] Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages. 14. Fire detectors Fireguards and fire extinguisher should be installed to protect computer system from fire. Alarms, security lighting and closed circuit television cameras should be used to protect computer system from theft. 15. Air Condition [SQE 2074K] Computer system needs air conditioned room because the factor of climate such as temperature and humidity can pose a threat to computer security. Extremely heat can cause failure of electronic components. Excessive or very low humidity can also have an adverse effect on the computer equipment. This leads to a reduction in the life span of equipment. So, a good air conditioning system is required to eradicate heat-related failures. 16. Password A password is a secret word or phrase that gives a user access to a particular program or system. To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized. Any four criteria for strong password are: a) Do not keep a password which can be easily guessed such as date of birth, nickname, etc. b) Do not keep word as password that is currently popular. c) Keep a password with mixture of alphabet and numbers which is difficult to guess. d) Keep changing your password regularly. How Password secure the data? [SEE 2075] Password secures the data by protecting the data from unauthorized access. 17. Password policy A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy. 18. Backup [SEE 2075 U] Backup is a copy of a file which is used in the event of the original file being corrupted. Backup is essential to computer security system to recover the important data and programs from accidental and intentional harm. They are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data and software.m being lost or damaged due to accidental or intentional harm is known as computer security. The types of computer security are hardware security and software security. 2. Objectives of computer security a) Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. b) Integrity refers to ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine. c) Availability means that information is accessible by authorized users. 3. Possible threats to computer security [SLC 2069 S] a) Human error c) Computer crime e) Natural disasters b) War and terrorist activity d) Hardware failure 4. Hardware security [SLC 2066] [SEE 2066 S] [SLC 2068 S] [SLC 2071 S] The securing hardware components of the computer system from being damaged or lost due to electrical voltage fluctuation, extreme temperatures, dust, high humidity or mechanical stress is known is hardware security. 5. Some of the hardware security measures [SLC 2064] [SLC 2065] [SEE 2067 S] [SLC 2070 S] [SLC 2071] a) Regular maintenance of computer hardware b) Fire detectors c) Insurance Policy d) Use grille in the windows and use lock in the door to protect from thieves e) Use power protection device to protect computer from power fluctuation. f) Use vacuum cleaner to clean the room and avoid dust g) Protect computer from rain water, moisture and other natural calamities 6. Software security [SLC 2065 S] [SEE 2066 S] The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security. Software prevents the data loss by a) Antivirus software can detect and remove virus from the computer. b) Scan disk checks folders, bad sector and other error of the disk and fix them. c) Software for backup helps in securing the information by keeping backup. 7. Some of the software security measures [SLC 2065] [SLC 2065 S] [SLC 2068] [SLC 2069] [SLC 2071 S] a) keep the backup copy of important data or software b) Scandisk c) Defragmentation d) use Password e) use antivirus software and update frequently f) use firewall to prevent virus. 8. Voltage regulator device A voltage regulator device is an electronic regulator device designed to automatically maintain a constant voltage SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha level.E.g.: UPS, Spike guard, Volt guard, etc. Power protection device The device that provides clean AC power to sensitive electrical equipment are called power protection devices. Examples are: UPS, Volt Guard, Spike guard, etc. Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss. 9. Importance of power protection device [SEE 2074] i) To protect the hardware against damage from unexpected power failures. ii) To protect files and programs being corrupted due to sudden power failure. 10. Surge Protector Surge protector is a device that shields computer and other electronic devices from surges in electric power or transient voltage, that flow from the power supply. 11. UPS (Uninterruptible Power Supply) A UPS is a device that allows computer to keep running for at least a short time when the primary power source is lost. It provides continuous power supply to the computer system and protects them from power surge and voltage fluctuation. 12. Importance of UPS [SLC 2070] The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure. 13. Regular Maintenance [SQE 2075K] Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages. 14. Fire detectors Fireguards and fire extinguisher should be installed to protect computer system from fire. Alarms, security lighting and closed circuit television cameras should be used to protect computer system from theft. 15. Air Condition [SQE 2074K] Computer system needs air conditioned room because the factor of climate such as temperature and humidity can pose a threat to computer security. Extremely heat can cause failure of electronic components. Excessive or very low humidity can also have an adverse effect on the computer equipment. This leads to a reduction in the life span of equipment. So, a good air conditioning system is required to eradicate heat-related failures. 16. Password A password is a secret word or phrase that gives a user access to a particular program or system. To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized. Any four criteria for strong password are: a) Do not keep a password which can be easily guessed such as date of birth, nickname, etc. b) Do not keep word as password that is currently popular. c) Keep a password with mixture of alphabet and numbers which is difficult to guess. d) Keep changing your password regularly. How Password secure the data? [SEE 2075] Password secures the data by protecting the data from unauthorized access. 17. Password policy A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy. 18. Backup [SEE 2075 U] Backup is a copy of a file which is used in the event of the original file being corrupted. Backup is essential to computer security system to recover the important data and programs from accidental and intentional harm. They are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data and software.
Written for
- Institution
- See computer science 2076 edited Computer Security
- Course
- See computer science 2076 edited Computer Security
Document information
- Uploaded on
- February 11, 2024
- Number of pages
- 104
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
- see computer science
-
see computer science 2076 edited computer
-
computer science 2076 edited