Cyber Security Week-1 Sample Questions and Answers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

Course Title: Cyber Security

Course C0-Ordinator: Dr Padmavathi Ganapathi


Week 1: Introduction to Cyber Security: Fundamentals of Cyber Space-
Information Systems-Security Principles - Why Cyber Security is important?-
Cyber security Challenges.

Sample Questions and Answers

1. Why Cyberspace is important in today’s era?


To make Internet services to be available to users freely and fairly at any time and place,
Cyberspace is used as a levelling medium. It provides equal opportunities for every users
to reap its benefits. Cyberspace provides free flow of information and knowledge across
Internet. Since, it is a virtual space it connects various users across different locations
supporting digital interaction and Information exchange.
2. Which feature of the Cyberspace makes it very important as well as complex?
Why?
Interconnecting various people over the virtual cyberspace for entertainment and social
networking purposes is the most important feature of cyberspace. But at the same time,
this interconnection through the virtual medium, makes it complex enabling hackers to
access the platform and carry out unintentional activities. Some of the unintentional
activities carried out are spamming, theft of confidential or sensitive information and other
security breaches and threats.
3. List any one activity or operation mechanism of a Hacker with an example.
Hackers are generally unauthorized users who invade into the system through
vulnerabilities or weak points. They make use of large diverse tools like a malicious logic
like virus or malware through some attachments and wait for the victims to open the
attachments. Since then a user clicks on the attachment link the hackers implant virus
that may cause downloading of inappropriate applications, unwanted operations or
destruction of the victim computer.
4. Identify one common way your computer has been affected. Explain the
mechanism.

CYBER SECURITY Week-1 Sample Questions and Answers


Opening an email from unknown resources is one of the most common way a system can
be affected. If a user unknowingly clicks on the link or opens an email from unknown
resources, it paves way to security loop holes of the system. This in turn, opens an entry
point for viruses and malwares thereby making computers to malfunction, cause damages
to the local data present in it or destroy the system entities. Some example includes
stealing of passwords, personal information or identity, credit card number, social security
number, etc.
5. Explain the administrative level responsibilities of protecting a system and the
consequences of a poor administrative mechanism.
Unauthorized administrators are high security risk. An unauthorized administrator
launches numerous attacks that includes malicious software on every client computer.
They also enable remote access tools to configure and gain system access without the
intended user’s permission. An administrative level responsibility of protecting the system
includes configuration against the DDoS attacks and running network monitoring tools to
prevent unauthorized packet sniffing.

****************************************************************************************************

CYBER SECURITY Week-1 Sample Questions and Answers

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy