Tutorial – Computer and Society Security Privacy & Ethics
Name: Date:
No Questions Marks
01 What is a computer security risk 2 marks
Event or action that causes loss of or damage to computer system.
02. Explain what is Hacker, Crackers? 4 marks
Hacker- someone who accesses a computer or network illegally.
Crackers- someone who accesses a computer or network illegal with the intent
of destroying data, stealing information or other malicious action.
03. What is Cyber extortionist vs Cyberterrorist 4 marks
Cyber extortionist is someone who uses email as a vehicle for extortion while
Cyberterrorist is someone who uses the internet or network to destroy or
damage the computers for politics reasons.
04. List at least 4 types of the Internet and network attacks 4 marks
1) Virus
2) Worm
3) Rootkit
4) Trojan horse
05. What is an antivirus program? 2 marks
Identifies and removes computer viruses and protect from worms, Trojan horse,
and spyware.
06. What are some tips for preventing virus, worm, and Trojan horse infections? 6 marks
1) Never start a computer with removable media inserted
2) Install an antivirus program on all of computers
3) Install a personal firewall program.
4) Check all downloaded programs for Trojan horses.
07. What are a botnets, denial of service attack, back door and spoofing? 4 marks
Botnets is a group of compromised computers connected to a network such as
the internet that are used as part of a network that attacks others networks,
usually for nefarious purpose. A denial of service attack is an assault which
disrupts computer access to internet. Backdoor is a program or set od
instructions in a program that allow users to bypass security controls. Spoofing
is a technique intruders use to make their network appear legitimate to a victim
computer.
08. What are a back door and spoofing? 4 marks
Backdoor is a program or set of instructions in a program that allow users to
bypass security controls. Spoofing is a technique intruders use to make their
network appear legitimate to a victim computer.
09. What is a firewall? 2 marks
Security system consisting of hardware and software that prevents unauthorized
intrusion.
10. What are hardware theft and hardware vandalism? 4 Marks
Hardware theft is an act of stealing computer equipment and Hardware
vandalism is an act of defacing or destroying computer equipment.
11. What is software theft? 2 Marks
An act of stealing , copying software, or intentionally erasing programs.
12. What are computer ethics? 2 Marks
Moral guidelines that govern use of computers and information system.
13. What are some ways to safeguard personal information? List any 4. 4 Marks
1) Install a cookie manager to filter cookies
2) Do not reply to spam for any reason
3) Install a personal firewall
4) Avoid shopping club and buyers club
14. What is information privacy? 2 Marks
Right of individuals and companies to deny or restrict collection and use of
information about them.
15. What is phishing? 2 Marks
Scam in which a perpetrator sends an official looking e-mail that attempts to
obtain your personal and financial information.