Preview

01 - Introduction to Security - the importance

 1. Computer networks have huge benefits but they also cause security risks.
Fill in the blanks: By connecting computers it is possible to 
share personal data easily. 

However, it makes computers _______________________
from other people
importanceofsecurity_question1.jpeg

  less vulnerable to interference

  unable to increase speed

  more vulnerable to interference

  very able to inrease speed

 2. Fill in the blanks
Anyone sharing personal information, e.g ______________ wants to be 
sure that they (the personal details) are safe and secure.

Most businesses and organisations 
employ network managers or administrators to manage the security of 
their networks

  fake name

  mouse click

  bank details

  weather search

 3. Read the excerpt below and fill in the blanks
Network security is the protection of access, _________ 
and __________ of files and directories in a computer network 
system. 

Some of the most common threats to a network include 
viruses, worms, spyware, adware and identity theft.

One of the most important aspects of network security is the
multiple layers of security.
importanceofsecurity_question3.jpeg

  searching and storing

  misuse, and hacking

  people, and personell

  users and children

 4. Many network security threats today are spread over the Internet. Which from the list is NOT a threat?
Viruses, worms, and Trojan horses
Spyware and adware
Zero-day attacks, also called zero-hour attacks
Search engine optimisation (SEO)
Hacker attacks, search engine optimisation,
Denial of service attack
Data interception and theft
Identity theft
Trojan horses

  Identity theft

  Trojan horses

  Denial of service attack

  Search engine optimisation (SEO)

 5. Read the following excerpt and define an 'unstructured' attack.
The grouping of attacks
=========================
Attacks can be categorised into two different groups; 
structured and unstructured. 

1 - A structured attack is an attack by an individual who has 
advanced computer skills and intentionally targeted a specific 
group or company.

2 - An unstructured attack is an attack by an individual 
who __________________________________________________________________ 


Both types of attacks should be taken seriously because they can 
expose confidential information and create distrust between a 
company and their client

  is an unschooled but brilliant hacker, capable of causing great harm

  fully understands who they are targeting and intends to kill

  does not understand who they are targeting and only use tools that can be found easily.

  has professionally armed themselves with the art of subtly targeting the government

 6. What it all boils down to is ______. Network security is important because keeping ______ safe is important.

  computers

  privacy policies

  cables

  data

 7. Fill in the blanks
What can happen to data?
===========================

___________data can be accessed by unauthorised individuals. 

This data can be ___________, changed, lost (which is what a company
would try to protect against). There are also legal 
obligations surrounding the storing of sensitive and persona; data 
that are important to consider 
importanceofsecurity_question7.jpg

  Fraudulent / bought

  Confidential / stolen

  Accurate / corrupted

  Subtle / found

 8. ____________ (also called ransomware) is another example of unauthorised data change.
Ransomware tries to encrypt your files so that they cannot be used unless payment is made to 'unlock' them. 

  swimwear

  viruswear

  malware

  hackerware

 9. A cyber attack is is an attempt to gain unauthorised access to, or control of, a computer and the network it is connected to.

  TRUE

  FALSE

 10. Network security is about keeping a network safe from:

  individuals

  governments

  disease

  unauthorised access

 11. Some types of data are worth real money and so are attractive targets for _____________
Bitcoin (?) is the world's first cryptocurrency, a form of electronic cash. 

It is the first decentralized digital currency: the system was designed 
to work without a central bank or single administrator. Bitcoins are 
sent from user to user on the peer-to-peer bitcoin network directly, 
without the need for intermediaries. These transactions are verified
by network nodes through cryptography and recorded in a public distributed 
ledger called a blockchain
importanceofsecurity_question11.jpg

  cyber-rule

  cyber-transaction

  cyber-theft.

  cyber-play

 12. Other examples of attractive targets for data theft would be:
1. Sales information (customer database) 
2. Inventory log (of kitchen plates) 
3. Intellectual Property, such as the latest research notes or trade notes
of a company. 

  1 only

  2 only

  1 and 2

  1 and 3

 13. Companies ought to keep certain personal details (such as passport number, NI number, and address) __________________

  hidden

  confidential

  mutable

  uncorruptable

 14. Medical records would count as:

  publicly accessible - as medical records are not personal

  personal information that must be kept secure

  centered information that can be shared with any public network (e.g the internet)

  open information that can be shared

 15. There are legal obligations that require networks and data holders to keep data secure. Penalties can include:

  Amputation of all fingers so as not to be able to type again

  Torturing and Acid Burning

  Execution and Death

  Hefty fines and even time in prison