Cyber Security

Cyber Security


Internet security relies on specific resources and standards for protecting data that gets sent through the internet. This includes various kinds of encryption such as Pretty Good Privacy(PGP). Other aspects of a secure web setup includes firewalls, which block unwanted traffic, anti-malware, anti-spyware & anti-virus programs that work from specific networks or devices to monitor internet traffic for dangerous attachments. Internet security is generally becoming a top priority for both businesses & governments. Good internet security protects financial details & much more of what is handle by a business or agency’s servers & network hardware. Insufficient internet security can threaten to collapse an e-commerce business or any other operation where data gets routed over the web.

Web security may be termed as technological & managerial procedures applied to computer systems to ensure the availability, integrity & confidentiality of computer assets & services from associated threats & vulnerabilities.

Concept of Internet Security :

Three basics security concepts important to inforation on the internet are confidentiality, integrity, &availability. Concepts relating to the people who use that information are authentication, authorization & non-repudiation. Integrity and confidentiality can also be enforced on web services through the use of transport layer security(TLS).both SSL and TSL are the same.

1) Integrity

The concept of integrity is divided in 2 forms:

A) Data integrity:

this property, that data has not been altered in an unauthorized manner while in storage, during processing or while in transit. another aspect of data integrity is the assurances that data can only be accessed and altered by those authorized to do so. often such integrity is insured by use of a number referred to as message integrity code or message authentication code. This are abbreviated as MIC and MAC respectively.

B) System integrity:

This quality states that a system has when performing the intended function in an unimpaired manner, is free from unauthorized manipulation. Integrity is commonly an organizations most important security objective, after availability. Integrity is particularly important for critical safety and financial data used for activities such as electronic funds transfers ,air traffic control ,and financial accounting.

2) Confidentiality:

Confidentiality is the requirement that private or confidential information should not be disclosed to unauthorized individuals. Confidentiality protection is applies to data in storage ,during processing ,and while in transit. For many organizations ,confidentiality is frequently behind availability and integrity in terms of importance. For some types of information ,confidentiality is a very important attribute. Examples includes research data ,medical and insurance records ,new product specifications ,and corporate investments strategies. In some locations ,there may be a legal obligation to protect the privacy of individuals. This is particularly true for banks and loans companies; debt collectors; businesses is that extend credit to their customers or issue credit cards ; hospitals ,doctor offices ,and medical testing laboratories; individuals or agencies that offer services such as psychological counseling or drug treatment; and agencies that collect taxes.

3) Availability:

Availability is a requirement intended to assure that system works promptly and services is not denied to authorized users. This objective protects against , intentional or accidental attempts to either perform unauthorized deletion of data otherwise cause a denial of service or data. Availability is frequently an organizations foremost security objective. To make information available to those who need it and who can be trusted with it, organizations used authentication and authorization.




Qus. 1 : Cryptography technique is used in ________.

  1. Polling
  2. Job Scheduling
  3. Protection
  4. File Management
Qus. 2 : IMAP protocol is used by fraud mailers for which purpose?

  1. Send fake mails
  2. Send Spam
  3. Hack Email
  4. All of the above
Qus. 3 : Which of the following is an anti-virus program

  1. Norton
  2. K7
  3. Quick heal
  4. All of these
Qus. 4 : All of the following are examples of real security and privacy threats except:

  1. Hackers
  2. Virus
  3. Spam
  4. Worm
Qus. 5 : _____________ monitors user activity on internet and transmit that information in the background to someone else.

  1. Malware
  2. Spyware
  3. Adware
  4. None of these
Qus. 6 : Viruses are __________.

  1. Man made
  2. Naturally occur
  3. Machine made
  4. All of the above
Qus. 7 : Firewall is a type of ____________.

  1. Virus
  2. Security threat
  3. Worm
  4. None of the above
Qus. 8 : Unsolicited commercial email is known as

  1. Spam
  2. Malware
  3. Virus
  4. Spyware
Qus. 9 : Which of the following is not an external threat to a computer or a computer network

  1. Ignorance
  2. Trojan horses
  3. Adware
  4. Crackers
Qus. 10 : When a person is harrassed repeatedly by being followed, called or be written to he / she is a target of

  1. Bullying
  2. Stalking
  3. Identity theft
  4. Phishing
Qus. 11 : What is Phishing?

  1. Fraudulently acquiring sensitive information.
  2. An encryption technique
  3. An anti-spam technique
  4. A password building technique
Qus. 12 : Data security threats include

  1. Hardware Failure
  2. Privacy Invasion
  3. Fraudulent Manipulation of Data
  4. All of the Above
Qus. 13 : Firewall is a type of

  1. Hardware
  2. Software
  3. Both Hardware and Software
  4. None of These
Qus. 14 : Unauthorized access is which type of threats

  1. Security
  2. Reliability
  3. Performance
  4. None of these
Qus. 15 : This is not type of cyber attacks

  1. Attacks on confidentiality
  2. Attacks on integrity
  3. Attacks on property
  4. All of the above
Qus. 16 : Which one is least Secure?

  1. Password
  2. Keycard
  3. Retina
  4. Fingerprint
Qus. 17 : Data encryption is used for

  1. Security
  2. Performance
  3. Storage
  4. All of above
Qus. 18 : ________is a secure cloud based platform for storage, sharing and verification of documents and certificates.

  1. Amazon Web Services
  2. Oracle Cloud
  3. Google Cloud
  4. Digilocker
Qus. 19 : Which of the following is NOT a common cybersecurity threat?

  1. Phishing
  2. Ransomware
  3. Firewall
  4. Malware
Qus. 20 : What is malware?

  1. A type of computer hardware
  2. A type of computer virus
  3. A security protocol
  4. A programming language
Qus. 21 : Which cybersecurity measure encrypts data to protect it from unauthorized access?

  1. Firewall
  2. Antivirus software
  3. Encryption
  4. Intrusion detection system (IDS)
Qus. 22 : What is a firewall in the context of cybersecurity?

  1. A physical barrier used to prevent unauthorized access to a computer network
  2. A software program or hardware device that monitors and controls incoming and outgoing network traffic
  3. A type of malware
  4. A social media platform
Qus. 23 : What is two-factor authentication (2FA)?

  1. A cybersecurity attack
  2. A social engineering tactic
  3. A security mechanism that requires users to provide two forms of identification to access an account or system
  4. A programming language
Qus. 24 : Which cybersecurity measure protects against malicious software by scanning and removing or quarantining it?

  1. Firewall
  2. Encryption
  3. Antivirus software
  4. Phishing
Qus. 25 : Which of the following is defined as an attempt to steal, spy, damage or destroy computer systems, networks, or their associated information?

  1. Cyber attack
  2. Computer security
  3. Cryptography
  4. Digital hacking
Qus. 26 : Which of the following is not an objective of network security?

  1. Confidentiality
  2. Integrity
  3. Availability
  4. Hacking

Programs

Latest Current Affairs 2024 Online Exam Quiz for One day Exam Online Typing Test CCC Online Test Python Programming Tutorials Best Computer Training Institute in Prayagraj (Allahabad) Online MBA 2 years Online MCA Online BCA Best Website and Software Company in Allahabad