Page 255 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 255

Exposure to Computer Disciplines



                   Notes         Threat: Any circumstance or event with the potential to harm an information system through
                                 unauthorized access, destruction, disclosure, modification of data, and/or denial of service.
                                 Threats arise from human actions and natural events.

                                 Threat source: Either (1) intent and method targeted at the intentional exploitation of a vulnerability
                                 or (2) the situation and method that may accidentally trigger a vulnerability.

                                 Threat analysis: The examination of threat sources against system vulnerabilities to determine
                                 the threats for a particular system in a particular operational environment.
                                 Trojans: Trojans are small viruses that hide within other programs. They can essentially exist
                                 anywhere.
                                 Virus: A computer virus is a small program that can replicate itself to infect computers. They were
                                 a problem even in the beginning phases of the internet.
                                 Voltage spikes: Temporary voltage increases are fairly common. Large motors or circuit breakers
                                 in industry can put them on the electrical line.
                                 Worms: Worms are similar to viruses in that they are small, malicious programs. The big difference,
                                 though, is that worms pose a threat even when computer users don’t download any files.


                                                1. Draw Spherical system of security.

                                                2. Draw Security Threats layout.


                                 13.8  Self-Assessment Questions

                                    1. What are the major technical areas of computer security are usually represented by the
                                      initials CIA?

                                         (a) Confidentiality           (b) Integrity
                                         (c) Authentication            (d) All of these

                                    2. A password policy that allows users to use blank or weak passwords is a hacker’s paradise.
                                         (a) True                      (b) False
                                    3. Security in the cloud is challenging, due to varied degree of ……………………….

                                         (a) Security features and arrangement
                                         (b) Security features and management

                                         (c) Security wall and management
                                         (d) All of the above
                                    4. The consequences of a successful deliberate or inadvertent misuse of a computer system in
                                      the aviation industry range from loss of system integrity to loss of confidentiality.

                                         (a) True                      (b) False
                                    5. A computer virus is a small program that can replicate itself to infect computers.

                                         (a) True                      (b) False




        248                               LOVELY PROFESSIONAL UNIVERSITY
   250   251   252   253   254   255   256   257   258   259   260