Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

See computer science 2076 edited Computer Security Questions and Answers [20]

Rating
-
Sold
-
Pages
104
Grade
A+
Uploaded on
11-02-2024
Written in
2023/2024

See computer science 2076 edited Computer Security Questions and Answers [20] 1. Computer security [SLC 2067] [SLC 2069] [SLC 2070 S] [SEE 2073] [SEE 2074 U] [SEE 2075 S2] The security given to the computer for the protection of hardware, software and data froSee computer science 2076 edited Computer Security Questions and Answers [20] 1. Computer security [SLC 2067] [SLC 2069] [SLC 2070 S] [SEE 2073] [SEE 2074 U] [SEE 2075 S2] The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security. The types of computer security are hardware security and software security. 2. Objectives of computer security a) Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. b) Integrity refers to ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine. c) Availability means that information is accessible by authorized users. 3. Possible threats to computer security [SLC 2069 S] a) Human error c) Computer crime e) Natural disasters b) War and terrorist activity d) Hardware failure 4. Hardware security [SLC 2066] [SEE 2066 S] [SLC 2068 S] [SLC 2071 S] The securing hardware components of the computer system from being damaged or lost due to electrical voltage fluctuation, extreme temperatures, dust, high humidity or mechanical stress is known is hardware security. 5. Some of the hardware security measures [SLC 2064] [SLC 2065] [SEE 2067 S] [SLC 2070 S] [SLC 2071] a) Regular maintenance of computer hardware b) Fire detectors c) Insurance Policy d) Use grille in the windows and use lock in the door to protect from thieves e) Use power protection device to protect computer from power fluctuation. f) Use vacuum cleaner to clean the room and avoid dust g) Protect computer from rain water, moisture and other natural calamities 6. Software security [SLC 2065 S] [SEE 2066 S] The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security. Software prevents the data loss by a) Antivirus software can detect and remove virus from the computer. b) Scan disk checks folders, bad sector and other error of the disk and fix them. c) Software for backup helps in securing the information by keeping backup. 7. Some of the software security measures [SLC 2065] [SLC 2065 S] [SLC 2068] [SLC 2069] [SLC 2071 S] a) keep the backup copy of important data or software b) Scandisk c) Defragmentation d) use Password e) use antivirus software and update frequently f) use firewall to prevent virus. 8. Voltage regulator device A voltage regulator device is an electronic regulator device designed to automatically maintain a constant voltage SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha level.E.g.: UPS, Spike guard, Volt guard, etc. Power protection device The device that provides clean AC power to sensitive electrical equipment are called power protection devices. Examples are: UPS, Volt Guard, Spike guard, etc. Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss. 9. Importance of power protection device [SEE 2074] i) To protect the hardware against damage from unexpected power failures. ii) To protect files and programs being corrupted due to sudden power failure. 10. Surge Protector Surge protector is a device that shields computer and other electronic devices from surges in electric power or transient voltage, that flow from the power supply. 11. UPS (Uninterruptible Power Supply) A UPS is a device that allows computer to keep running for at least a short time when the primary power source is lost. It provides continuous power supply to the computer system and protects them from power surge and voltage fluctuation. 12. Importance of UPS [SLC 2070] The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure. 13. Regular Maintenance [SQE 2075K] Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages. 14. Fire detectors Fireguards and fire extinguisher should be installed to protect computer system from fire. Alarms, security lighting and closed circuit television cameras should be used to protect computer system from theft. 15. Air Condition [SQE 2074K] Computer system needs air conditioned room because the factor of climate such as temperature and humidity can pose a threat to computer security. Extremely heat can cause failure of electronic components. Excessive or very low humidity can also have an adverse effect on the computer equipment. This leads to a reduction in the life span of equipment. So, a good air conditioning system is required to eradicate heat-related failures. 16. Password A password is a secret word or phrase that gives a user access to a particular program or system. To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized. Any four criteria for strong password are: a) Do not keep a password which can be easily guessed such as date of birth, nickname, etc. b) Do not keep word as password that is currently popular. c) Keep a password with mixture of alphabet and numbers which is difficult to guess. d) Keep changing your password regularly. How Password secure the data? [SEE 2075] Password secures the data by protecting the data from unauthorized access. 17. Password policy A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy. 18. Backup [SEE 2075 U] Backup is a copy of a file which is used in the event of the original file being corrupted. Backup is essential to computer security system to recover the important data and programs from accidental and intentional harm. They are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data and software.m being lost or damaged due to accidental or intentional harm is known as computer security. The types of computer security are hardware security and software security. 2. Objectives of computer security a) Confidentiality refers to protecting information from being accessed by unauthorized parties. In other words, only the people who are authorized to do so can gain access to sensitive data. b) Integrity refers to ensuring the authenticity of information—that information is not altered, and that the source of the information is genuine. c) Availability means that information is accessible by authorized users. 3. Possible threats to computer security [SLC 2069 S] a) Human error c) Computer crime e) Natural disasters b) War and terrorist activity d) Hardware failure 4. Hardware security [SLC 2066] [SEE 2066 S] [SLC 2068 S] [SLC 2071 S] The securing hardware components of the computer system from being damaged or lost due to electrical voltage fluctuation, extreme temperatures, dust, high humidity or mechanical stress is known is hardware security. 5. Some of the hardware security measures [SLC 2064] [SLC 2065] [SEE 2067 S] [SLC 2070 S] [SLC 2071] a) Regular maintenance of computer hardware b) Fire detectors c) Insurance Policy d) Use grille in the windows and use lock in the door to protect from thieves e) Use power protection device to protect computer from power fluctuation. f) Use vacuum cleaner to clean the room and avoid dust g) Protect computer from rain water, moisture and other natural calamities 6. Software security [SLC 2065 S] [SEE 2066 S] The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security. Software prevents the data loss by a) Antivirus software can detect and remove virus from the computer. b) Scan disk checks folders, bad sector and other error of the disk and fix them. c) Software for backup helps in securing the information by keeping backup. 7. Some of the software security measures [SLC 2065] [SLC 2065 S] [SLC 2068] [SLC 2069] [SLC 2071 S] a) keep the backup copy of important data or software b) Scandisk c) Defragmentation d) use Password e) use antivirus software and update frequently f) use firewall to prevent virus. 8. Voltage regulator device A voltage regulator device is an electronic regulator device designed to automatically maintain a constant voltage SEE COMPUTER SCIENCE 2076 Compiled by: Deepak Shrestha level.E.g.: UPS, Spike guard, Volt guard, etc. Power protection device The device that provides clean AC power to sensitive electrical equipment are called power protection devices. Examples are: UPS, Volt Guard, Spike guard, etc. Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss. 9. Importance of power protection device [SEE 2074] i) To protect the hardware against damage from unexpected power failures. ii) To protect files and programs being corrupted due to sudden power failure. 10. Surge Protector Surge protector is a device that shields computer and other electronic devices from surges in electric power or transient voltage, that flow from the power supply. 11. UPS (Uninterruptible Power Supply) A UPS is a device that allows computer to keep running for at least a short time when the primary power source is lost. It provides continuous power supply to the computer system and protects them from power surge and voltage fluctuation. 12. Importance of UPS [SLC 2070] The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure. 13. Regular Maintenance [SQE 2075K] Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages. 14. Fire detectors Fireguards and fire extinguisher should be installed to protect computer system from fire. Alarms, security lighting and closed circuit television cameras should be used to protect computer system from theft. 15. Air Condition [SQE 2074K] Computer system needs air conditioned room because the factor of climate such as temperature and humidity can pose a threat to computer security. Extremely heat can cause failure of electronic components. Excessive or very low humidity can also have an adverse effect on the computer equipment. This leads to a reduction in the life span of equipment. So, a good air conditioning system is required to eradicate heat-related failures. 16. Password A password is a secret word or phrase that gives a user access to a particular program or system. To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized. Any four criteria for strong password are: a) Do not keep a password which can be easily guessed such as date of birth, nickname, etc. b) Do not keep word as password that is currently popular. c) Keep a password with mixture of alphabet and numbers which is difficult to guess. d) Keep changing your password regularly. How Password secure the data? [SEE 2075] Password secures the data by protecting the data from unauthorized access. 17. Password policy A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy. 18. Backup [SEE 2075 U] Backup is a copy of a file which is used in the event of the original file being corrupted. Backup is essential to computer security system to recover the important data and programs from accidental and intentional harm. They are stored in different storage devices like hard disk, CDs and pen drives. When the data and software gets lost or damaged the backup system helps to recover the lost or damaged data or software from the backup copy of data and software.

Show more Read less
Institution
See Computer Science 2076 Edited Computer Security
Course
See computer science 2076 edited Computer Security











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
See computer science 2076 edited Computer Security
Course
See computer science 2076 edited Computer Security

Document information

Uploaded on
February 11, 2024
Number of pages
104
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$11.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
munenedennis Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
12
Member since
2 year
Number of followers
6
Documents
707
Last sold
4 months ago

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions