Worksheet
Course: Computer Security
Chapter Covered:
1. Introduction to Computer Security
2. Encryption
3. Public-Key Cryptography and Message Authentication
4. Operating System Security
Section 1: Key Concepts
1. Define the following terms:
a) Confidentiality
b) Integrity
c) Availability
d) Authentication
e) Cryptography
f) Malware
2. Short Answer Questions:
a) What are the primary goals of computer security?
b) Explain the importance of the CIA triad in cybersecurity.
c) What are the common security threats to an operating system?
d) Describe how encryption enhances data security.
Section 2: Multiple Choice Questions (MCQs)
1. Which of the following is NOT a component of the CIA triad?
a) Confidentiality
b) Authentication
c) Integrity
d) Availability
2. What is the primary function of a firewall?
a) Encrypt data transmission
b) Monitor and control network traffic
c) Detect physical intrusions
d) Remove malware from a system
3. Which encryption method uses two different keys for encryption and decryption?
a) Symmetric encryption
b) Asymmetric encryption
c) Hashing
d) Stream cipher
4. A Trojan horse is a type of:
a) Virus
b) Worm
c) Malware
d) Spyware
Section 3: True or False
1. A strong password should contain at least 8 characters, including uppercase, lowercase,
numbers, and special symbols.
2. Digital signatures are used only for encrypting messages.
3. A brute force attack attempts to guess a password by trying all possible combinations.
4. Public-key encryption requires both the sender and receiver to have a shared secret key.
Section 4: Case Study
Scenario: You are an IT security specialist at a company that recently suffered a data breach. The
attackers gained access through weak authentication mechanisms and installed malware on
company servers.
1. Identify three security weaknesses that may have led to this breach.
2. Suggest at least three measures to prevent such incidents in the future.
3. How would you implement authentication measures to enhance security?
Section 5: Practical Exercises
1. Write an example of a strong password and explain why it is secure.
Section 6: Discussion Questions
1. Discuss the advantages and disadvantages of symmetric and asymmetric encryption.
2. How does multi-factor authentication improve security?
3. Why is it important to regularly update operating systems and applications?
4. Explain the role of intrusion detection systems (IDS) in network security.
End of Worksheet