1. Farah Adilah works as an Information System Officer in Takaful Insurance Company. One of his responsibilities is to make sure all corporate clients' data and information protected and safe.
a) State the definition of Computer Security Risks.
b) State one (1) example of security risk.
c) Identify two (2) security measures those are suitable to overcome the security risk
mentioned in 1 b).
d) Name the technology that encodes information so it can only be read by authorized individuals.
2. Lately Dr. Yassin has found that his computer has been illegally access by someone. In order to overcome this problem, he has created a logon username and password for his computer. Furthermore, his computer has been infected with various malicious codes.
a) State the name of the action underlined in the paragraph above.
b) Give one (1) advantage of the action taken.
c) Name one (1) type of malicious codes that has possibly attacked his computer.
d) Identify one (1) security measures that he can take to protect his computer from malicious
codes.
3. a. Computer viruses, worms, Trojan horses, and rootkits are classified as ____, which are
programs that act without a user’s knowledge and deliberately alter the computer’s operations.
b. ____ is a technique intruders use to make their network or Internet transmission appear
legitimate to a victim computer or network.
c. A personal ____ is a utility program that detects and protects a personal computer and its data
from unauthorized access.
d. ____ occurs when someone steals personal or confidential information.
e. A system ____ is the prolonged malfunction of a computer.
f. A(n) ____ is a device that contains surge protection circuits and one or more batteries that can provide
power during a temporary or permanent loss of power.
berita terkini (utusan Malaysia)
No comments:
Post a Comment