Saturday

ONLINE ACCESS AND COMPUTER SECURITY || Computer Science || Class 11

 

ONLINE ACCESS AND COMPUTER SECURITY

Short Answer Type Questions  Q.1  What is a virus? What is anti-virus software?

Ans: A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

   Antivirus software is a program or set of programs that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans, adware, and more

Q.2  How is backup utility useful? Is it necessary to take backup of data?

Ans: Backup is a very helpful utility. You can backup your data with that and whenever your data is corrupted by any virus or Trojans your data will remain safe.

It is not necessary to backup your until or unless you have something really important stuff in your machine.The backup depends on your wish if you want to make backup, go on for it and if you don't leave it. But if you have something very useful for you in future then its better to take backup.

Q.3  What is Computer virus? How can it affect your computer?

Ans: A computer virus is a malicious program that self-replicates by copying itself to another program. In other words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design computer viruses with malicious intent and prey on online users by tricking them.

Q.4  What are different types of threats to computer security?

Ans: A Threat is a potential violation of security. When a threat is actually executed, it becomes attack. Those who execute such actions, or cause them to be executed are called attackers. 

Some common threats the average computer user faces everyday are

1.    Viruses 

2.    Worms 

3.    Trojans 

4.    Spyware 

5.    Adware 

6.    Spamming 

7.    PC Intrusion: 

8.    Denial of Service 

9.    Sweeping 

10.  Password Guessing 

11.  Phishing

Q.5  What type damages can be caused by viruses to your computer?

Ans:  Damages caused by Viruses: 

  Damage or Delete files. 

  Slow down your computer. 

  Invade your email programs.

 

Q.6       What are malware? What type damages can they cause to your computer?

Ans: "Malware" is short for malicious software and used as a single term to refer to virus, spy ware, worm etc. Malware is designed to cause damage to a stand-alone computer or a networked pc. So wherever a malware term is used it means a program which is designed to damage your computer it may be a virus, worm or Trojan.

Q.7       What is a spam? Why has it become a big Internet issue?

Ans: Spam email is a form of commercial advertising which is economically viable because email is a very cost-effective medium for the sender. If just a fraction of the recipients of a spam message purchase the advertised product, the spammers are making money and the spam problem is perpetuated.

Q.8       What do you understand by PC intrusion?

Ans: Intrusion - Computer Definition. To compromise a computer system by breaking the security of such a system or causing it to enter into an insecure state. The act of intruding—or gaining unauthorized access to a system—typically leaves traces that can be discovered by intrusion detection systems.

Q.9       What measures would you take to avoid  - 

           (a)Virus attack        (b) Spyware  (c) Adware (d) Spam                (e) PC Intrusion

Ans: (a), (b)& (c)                                                                                        (d)  

 

(e)  

 

 

 

 

 

 

Q.10    What are denial-of-service or Sweeper attack?

Ans: A denial-of-service attack is a security event that occurs when an attacker prevents legitimate users from accessing specific computer systems, devices, services or other IT resources.

Q.11    What is Phishing?

Ans: 

 

 

 

 

 

Q.12    How is pharming similar to and different from phishing?

Ans: 

 

 

 

 

 

Q.13    What is Authentication and Authorization? Why are these two used together?

Ans: Difference between Authentication and Authorization. Both the terms are often used in conjunction with each other in terms of security, especially when it comes to gaining access to the system. Authentication means confirming your own identity, while authorization means granting access to the system.

 

 

 

Q.14    What is the significance of Firewall in a computer‟s security scheme?

Ans: 

 

 

 

 

 

 

 

 

 

Q.15    What is Eavesdropping? What security measures can you take up to prevent it?

Ans: 

 

 

 

 

 

Q.16    What is the need for secure passwords?

Ans: A password that is difficult to detect by both humans and computer programs, effectively protecting data from unauthorized access. A strong password consists of at least six characters (and the more characters, the stronger the password) that are a combination of letters, numbers and symbols (@, #, $, %, etc.) if allowed. Passwords are typically casesensitive, so a strong password contains letters in both uppercase and lowercase. Strong passwords also do not contain words that can be found in a dictionary