Preview

03 - Introduction to Security - the importance

 1. Computer networks have huge benefits but they also cause security risks.
Fill in the blanks: By connecting computers it is possible to 
share personal data easily. 

However, it makes computers _______________________
from other people
importanceofsecurity_question1.jpeg

  less vulnerable to interference

  unable to increase speed

  very able to inrease speed

  more vulnerable to interference

 2. Fill in the blanks
Anyone sharing personal information, e.g ______________ wants to be 
sure that they (the personal details) are safe and secure.

Most businesses and organisations 
employ network managers or administrators to manage the security of 
their networks

  mouse click

  fake name

  bank details

  weather search

 3. Read the excerpt below and fill in the blanks
Network security is the protection of access, _________ 
and __________ of files and directories in a computer network 
system. 

Some of the most common threats to a network include 
viruses, worms, spyware, adware and identity theft.

One of the most important aspects of network security is the
multiple layers of security.
importanceofsecurity_question3.jpeg

  people, and personell

  users and children

  searching and storing

  misuse, and hacking

 4. Many network security threats today are spread over the Internet. Which from the list is NOT a threat?
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Search engine optimisation (SEO)
Hacker attacks, search engine optimisation,
Denial of service attack
Data interception and theft
Identity theft
Trojan horses

  Denial of service attack

  Search engine optimisation (SEO)

  Trojan horses

  Identity theft

 5. Read the following excerpt and define an 'unstructured' attack.
The grouping of attacks
=========================
Attacks can be categorised into two different groups; 
structured and unstructured. 

1 - A structured attack is an attack by an individual who has 
advanced computer skills and intentionally targeted a specific 
group or company.

2 - An unstructured attack is an attack by an individual 
who __________________________________________________________________ 


Both types of attacks should be taken seriously because they can 
expose confidential information and create distrust between a 
company and their client

  does not understand who they are targeting and only use tools that can be found easily.

  has professionally armed themselves with the art of subtly targeting the government

  is an unschooled but brilliant hacker, capable of causing great harm

  fully understands who they are targeting and intends to kill

 6. What it all boils down to is ______. Network security is important because keeping ______ safe is important.

  cables

  privacy policies

  data

  computers

 7. Fill in the blanks
What can happen to data?
===========================

___________data can be accessed by unauthorised individuals. 

This data can be ___________, changed, lost (which is what a company
would try to protect against). There are also legal 
obligations surrounding the storing of sensitive and persona; data 
that are important to consider 
importanceofsecurity_question7.jpg

  Accurate / corrupted

  Confidential / stolen

  Fraudulent / bought

  Subtle / found

 8. ____________ (also called ransomware) is another example of unauthorised data change.
Ransomware tries to encrypt your files so that they cannot be used unless payment is made to 'unlock' them. 

  viruswear

  malware

  swimwear

  hackerware

 9. A cyber attack is is an attempt to gain unauthorised access to, or control of, a computer and the network it is connected to.

  TRUE

  FALSE

 10. Network security is about keeping a network safe from:

  disease

  governments

  unauthorised access

  individuals

 11. Some types of data are worth real money and so are attractive targets for _____________
Bitcoin (?) is the world's first cryptocurrency, a form of electronic cash. 

It is the first decentralized digital currency: the system was designed 
to work without a central bank or single administrator. Bitcoins are 
sent from user to user on the peer-to-peer bitcoin network directly, 
without the need for intermediaries. These transactions are verified
by network nodes through cryptography and recorded in a public distributed 
ledger called a blockchain
importanceofsecurity_question11.jpg

  cyber-play

  cyber-rule

  cyber-transaction

  cyber-theft.

 12. Other examples of attractive targets for data theft would be:
1. Sales information (customer database) 
2. Inventory log (of kitchen plates) 
3. Intellectual Property, such as the latest research notes or trade notes
of a company. 

  1 and 2

  2 only

  1 only

  1 and 3

 13. Companies ought to keep certain personal details (such as passport number, NI number, and address) __________________

  hidden

  uncorruptable

  mutable

  confidential

 14. Medical records would count as:

  publicly accessible - as medical records are not personal

  centered information that can be shared with any public network (e.g the internet)

  open information that can be shared

  personal information that must be kept secure

 15. There are legal obligations that require networks and data holders to keep data secure. Penalties can include:

  Amputation of all fingers so as not to be able to type again

  Hefty fines and even time in prison

  Torturing and Acid Burning

  Execution and Death