Page 256 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 256

Unit 13: Understanding the Need of Security Measures



               6.  What Trojans are called?                                                       Notes
                    (a)  RAM Access Trojans (RATs).

                    (b)  ROM Access Trojans (RATs).
                    (c)  Remote Access Trojans (RATs).

                    (d)  None of the above
               7.  Computer infections source is the Customer Engineer (CE), or repairman.
                    (a)  True                    (b)  False

               8.  What does Data protection means?
                    (a)  Means making sure that private data belonging to a person or organization is kept
                       hidden from those who are authorized to use it.

                    (b)  Making sure that private data belonging to a person or organization is kept hidden
                       from those who are not authorized to use it.

                    (c)  making sure that organizational data belonging to a person or organization is kept
                       hidden from those who are not authorized to use it.

                    (d)  All of the above
               9.  Cyber terrorism can not include attacks on Internet business,

                    (a)  True                    (b)  False
              10.  Hardware attackers’ goals are usually tied to the IC’s applications.

                    (a)  True                    (b)  False
            13.9 Review Questions


               1.  What are security issues related to computer hardware?
               2.  Elaborate the importance of security in an organization.

               3.  Define computer security and write down the major components of spherical security
                 system.

               4.  What are viruses and enumerate and explain briefly about the related risk agents?
               5.  How important is hardware security and briefly explain the important risks associated with
                 hardware threats?
               6.  Elaborate and explain about CIA.

               7.  What is cyber terrorism and why it is important from national welfare point of view?
               8.  What is electronic cyber terrorism?
               9.  Enumerate and explain various threats related to data security.

              10.  Enlist various security requirement parameters.
              11.  Define the following terms:
                   (a) Malware   (b) Spyware    (c) Hacker    (d) Trojan

              12.  Write the steps of protection for users.


                                             LOVELY PROFESSIONAL UNIVERSITY                                   249
   251   252   253   254   255   256   257   258   259   260   261