The document contains questions about fundamental concepts in systems security for a class on the topic. It asks students to define key terms like information systems security, firewalls, crackers and phreakers. It also asks students to describe different types of malicious code, the functions of information security for organizations, and differences between integrity and efficiency. Additional questions cover forces of nature and security, backdoors/rootkits, information extortion, worms, sabotage/vandalism and viruses. It concludes with questions about protecting against software attacks, intellectual property, technical hardware failures, technological obsolescence, attacks, exploits, vulnerabilities, and distributed denial of service attacks.
The document contains questions about fundamental concepts in systems security for a class on the topic. It asks students to define key terms like information systems security, firewalls, crackers and phreakers. It also asks students to describe different types of malicious code, the functions of information security for organizations, and differences between integrity and efficiency. Additional questions cover forces of nature and security, backdoors/rootkits, information extortion, worms, sabotage/vandalism and viruses. It concludes with questions about protecting against software attacks, intellectual property, technical hardware failures, technological obsolescence, attacks, exploits, vulnerabilities, and distributed denial of service attacks.
The document contains questions about fundamental concepts in systems security for a class on the topic. It asks students to define key terms like information systems security, firewalls, crackers and phreakers. It also asks students to describe different types of malicious code, the functions of information security for organizations, and differences between integrity and efficiency. Additional questions cover forces of nature and security, backdoors/rootkits, information extortion, worms, sabotage/vandalism and viruses. It concludes with questions about protecting against software attacks, intellectual property, technical hardware failures, technological obsolescence, attacks, exploits, vulnerabilities, and distributed denial of service attacks.
2. Explain the limitations of firewalls 3. What is the major difference between a cracker and a phreaker 4. Give a brief description of different malicious code that you are aware of 5. Provide the different functions that information security performs for an organization 6. What is the difference between the following terms as used in systems Security Integrity and efficiency 7. Write short notes on forces of nature and how they affect information security 8. Explain the following terms I. Backdoors/rootkits II. Information extortion III. Worm IV. Sabotage/ vandalism V. Virus 9. How can an institution or organization protect itself from deliberate software attacks
10. What is intellectual property
11. Give a brief description of Technical hardware failures or errors
12. What are some of the consequences of Technological obsolescence 13. What do you understand by the term attack 14. Explain the term Exploit 15. HOw can you explain Vulnerability as used in systems security 16. What is meant by distributed denial of Service Attack