Friday, July 14, 2017

Computer Security [Hardware and Software Security] - SEE 2074



1.     What is computer security? List its types.
Ans: The security given to the computer for the protection of hardware, software and data from being lost or damaged due to accidental or intentional harm is known as computer security.
The types of security are:
a)     Hardware security
b)     Software security

2.     What are the main objectives of computer security?
Ans: The main objectives of computer security involve ensuring confidentiality (privacy), integrity (reliability), and availability of assets or information.

3.     Write down any five possible threats to computer security?
Ans: five possible threats to computer security are:
a)     Human error
b)     Computer crime
c)     Natural disasters
d)     War and terrorist activity
e)     Hardware failure

4.     Why do we need to provide security to our computer system?
Ans: We need to provide security to our computer system because if we do not take care of a computer system than our valuable data, information and programs may be lost or damaged. We may lose data, information or programs due to computer viruses. The computer system may be damaged due to some physical factors like fluctuation in electric power, dust, overheat, etc. Thus to protect our computer from various negative aspects we should provide security to our computer system.

5.     What is hardware security?
Ans: The security given to the various hardware tools or equipment from being lost or damaged due to accidental or intentional harm is known as hardware security.

6.     List some of the hardware security measures.
Ans: Some of the hardware security measures are:
i) Regular maintenance
ii) Insurance Policy
iii) Power Regulator Device
iv) Fire detectors
v) Protection from theft

7.     What is software security?
Ans: The security given to the software and data from being lost or damaged due to accidental or intentional harm is called software security.

8.     List some of the software security measures.
Ans: Some of the software security measures are:
i) Backup
ii) Scandisk
iii) Defragmentation
iv) Password

9.  What is voltage regulator device? Give example.
Ans: A voltage regulator device is an electrical regulator device designed to automatically maintain a constant voltage level.
E.g.: Spike guard, Volt guard, etc.

10.  What is the function of voltage regulators?
Ans: The voltage regulator automatically maintains a constant voltage level.

11.  What are power protection devices? Give examples.
Ans: The device that provides clean AC power to sensitive electrical equipment are called power protection devices. Examples are: UPS, Volt Guard, Spike guard, etc.

12.  Why is power protection device needed in a computer system?
Ans: Power protection device is needed in a computer system to protect the computer system from damage and expensive data loss.

13.  What is UPS?
Ans: A UPS is a battery supported power protection device that controls the electric voltage and supplies clean and continuous power supply to the computer even during power failures.

14.  What is importance of UPS in computer security system?
Ans: The importance of UPS in computer security system is that it controls fluctuation of electric voltage and provides enough backup electric power to the computer system when there is power failure.

15.  Why do the computer system need regular maintenance?
Ans: Computer system need regular maintenance to keep the computer hardware in good working condition and it also helps to find out problems in hardware and correct the problems before they cause several damages.

16.  What should be done to protect computer system from fire and theft?
Ans: Fireguards and fire extinguisher should be installed to protect computer system from fire. Alarms, security lighting and closed circuit television cameras should be used to protect computer system from theft.

17.  What is surge protector?
Ans: A device that shields computer and other electronic devices from surges in electric power or transient voltage, that flow from the power supply.

18.  What is password?
Ans: A password is a secret word or phrase that gives a user access to a particular program or system.

19.  Write any four criteria for a strong password.
Ans: Any four criteria for strong password are:
·       Do not keep a password which can be easily guessed such as date of birth, nickname, etc.
·       Do not keep word as password that is currently popular.
·       Keep a password with mixture of alphabet and numbers which is difficult to guess.
·       Keep changing your password regularly.

20.  What is password policy?
Ans: A set of rules designed to enhance computer security by encouraging user to employee strong passwords and use them properly is called password policy.

21.  What should be done to protect the system from unauthorized access?
Ans: To protect a system from unauthorized access, password should be kept in a system which provides security to the system. A password should be difficult to guess and determine and should be changed regularly and memorized.

22.  What is backup? Why is backup vital to computer system?
Ans: Backup is a copy of a file which is used in the event of the original file being corrupted.
Backup is essential to computer security system because when data and software are corrupted or lost, we can recover from the backup copy as backups are kept in different locations such as hard disk, compact disks, tapes and on the internet.

23.  How can software prevent data loss?
Ans: Software prevents the data loss by the following ways:
i) Antivirus software can detect and remove virus from the computer.
ii) Scan disk checks folders, bad sector and other error of the disk and fix them.
iii) Software for backup helps in securing the information by keeping backup.

24.  What is scan disk?
Ans: Scan disk is a process which involves in maintaining the disk files and folders using a kind of utility software which checks files, folders, bad sectors, lost clusters, lost chains and any errors of the specific disk and can fix them if it is possible.

25.  Define fragmentation and defragmentation?
Ans: The scattering of the parts of the same disk file over different location is called fragmentation.
The process of re-writing parts of a file to contiguous sectors on a hard disk to increase the speed of access and retrieval is called defragmentation.

 


***