HomeQuestions and Answers

RSCIT Assessment 9 : Basics of Cybersecurity and Safety

Like Tweet Pin it Share Share Email

RSCIT Assessment 9 focuses on essential cybersecurity concepts. It covers the basics of protecting systems, networks, and data from unauthorized access and cyber threats. Topics like virus protection, data encryption, and safe internet practices are explored to help you understand and implement security measures effectively in the digital world.

Advertisements

Understanding Cybersecurity: An Overview

Cybersecurity refers to the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. Cybersecurity is essential in today’s digital age, where sensitive data is continuously transferred and stored online.

Questions and Answers:

What is cybersecurity?

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks.

Advertisements

Why is cybersecurity important?

Cybersecurity is important because it helps protect sensitive data and prevents unauthorized access to digital systems.

What are some common types of cyber attacks?

Common types include phishing, ransomware, malware, and denial-of-service attacks.

What is the primary goal of cybersecurity?

The primary goal of cybersecurity is to protect data and maintain the integrity, confidentiality, and availability of information.

How does a firewall contribute to cybersecurity?

A firewall acts as a barrier between trusted and untrusted networks, controlling incoming and outgoing traffic based on security rules.

What is a phishing attack?

A phishing attack is a type of cyber attack where attackers disguise themselves as legitimate entities to steal sensitive information.

How can individuals protect themselves from cyber threats?

Individuals can use strong passwords, avoid suspicious links, update software regularly, and use security software.

What is the difference between a virus and a worm in cybersecurity?

A virus attaches itself to legitimate programs and spreads when executed, while a worm is a standalone malware that replicates itself to spread to other systems.

What role does encryption play in cybersecurity?

Encryption protects data by converting it into a code to prevent unauthorized access.

What is multi-factor authentication?

Multi-factor authentication (MFA) is a security process that requires multiple forms of verification before granting access to a system.


Virus Protection: Safeguarding Your System

Virus protection involves using software and best practices to defend against computer viruses, which are malicious programs designed to disrupt, damage, or gain unauthorized access to computer systems. Antivirus software is commonly used to detect and remove viruses before they can cause harm.

Questions and Answers:

What is a computer virus?

A computer virus is a malicious program that replicates itself and spreads to other computers, causing harm.

See also  rscit assessment 15 : Important Questions and Answers

How does antivirus software work?

Antivirus software scans files and programs for known virus signatures and removes or quarantines infected files.

What is the difference between a virus and malware?

A virus is a type of malware specifically designed to spread and replicate, while malware is a broader term that includes all types of malicious software.

What are some common signs of a virus infection on a computer?

Common signs include slow performance, frequent crashes, pop-up ads, and unknown programs running on the system.

What is real-time protection in antivirus software?

Real-time protection actively monitors a system for suspicious activity and threats, providing immediate protection against viruses.

Why is it important to update antivirus software regularly?

Regular updates ensure that the antivirus software can detect and protect against the latest viruses and threats.

Can a virus be removed manually without antivirus software?

While it’s possible, manually removing a virus can be complex and risky, and it’s safer to use specialized antivirus software.

What is a false positive in antivirus software?

A false positive occurs when antivirus software incorrectly identifies a legitimate file as a virus.

How can users avoid downloading viruses?

Users can avoid downloading viruses by not clicking on suspicious links, avoiding unknown email attachments, and downloading software only from trusted sources.

What is a quarantine feature in antivirus software?

The quarantine feature isolates and restricts access to infected files, preventing them from causing harm to the system.


Case Study: The WannaCry Ransomware Attack

The WannaCry ransomware attack occurred in May 2017, affecting hundreds of thousands of computers worldwide. It exploited a vulnerability in the Windows operating system, encrypting users’ files and demanding a ransom in Bitcoin to restore access. The attack highlighted the importance of regular software updates and cybersecurity awareness.

Questions and Answers:

What was the WannaCry ransomware attack?

The WannaCry ransomware attack was a global cyber attack in 2017 that encrypted users’ files and demanded a ransom to restore access.

Which operating system vulnerability did WannaCry exploit?

WannaCry exploited a vulnerability in the Windows operating system known as EternalBlue.

What was the primary impact of the WannaCry attack?

The primary impact was the encryption of files on infected computers, rendering them inaccessible without paying a ransom.

How was WannaCry spread?

WannaCry spread through networks by exploiting the EternalBlue vulnerability and through phishing emails.

What is ransomware?

Ransomware is a type of malware that encrypts a user’s files and demands payment to restore access.

See also  SSLC Exam 2021 : Old Answer Sheet and Things To Know

How could the WannaCry attack have been prevented?

The attack could have been prevented by applying security patches, using updated antivirus software, and avoiding clicking on suspicious links.

What role did Bitcoin play in the WannaCry attack?

The attackers demanded ransom payments in Bitcoin, a cryptocurrency, to make the transactions difficult to trace.

What was the response from organizations to the WannaCry attack?

Organizations responded by patching vulnerabilities, restoring from backups, and in some cases, paying the ransom.

Did paying the ransom guarantee file recovery in WannaCry?

No, paying the ransom did not guarantee file recovery, as some victims reported that they did not receive the decryption key even after payment.

What lessons were learned from the WannaCry attack?

Lessons included the importance of regular software updates, robust cybersecurity practices, and the need for secure backup systems.


Data Encryption: Securing Sensitive Information

Data encryption is the process of converting plaintext into ciphertext to protect sensitive information from unauthorized access. Encryption is a critical component of cybersecurity, ensuring that data remains confidential and secure during storage and transmission.

Questions and Answers:

What is data encryption?

Data encryption is the process of converting plaintext into ciphertext to protect data from unauthorized access.

Why is encryption important in cybersecurity?

Encryption is important because it ensures that even if data is intercepted, it cannot be read without the decryption key.

What are the two main types of encryption?

The two main types are symmetric encryption, where the same key is used for encryption and decryption, and asymmetric encryption, where different keys are used.

What is a common use of encryption in everyday technology?

A common use is in securing online transactions, such as those conducted over HTTPS, to protect sensitive information like credit card numbers.

What is the difference between encryption and hashing?

Encryption is reversible and used for data confidentiality, while hashing is a one-way process used to verify data integrity.

What role does encryption play in email security?

Encryption secures email contents, ensuring that only the intended recipient can read the message.

What is an encryption key?

An encryption key is a string of characters used to encrypt and decrypt data.

What is end-to-end encryption?

End-to-end encryption ensures that data is encrypted from the sender to the receiver, with no intermediate decryption.

See also  RSCIT Assessment 11 : Important Questions and Answers

How can users ensure their data is encrypted?

Users can ensure encryption by using encrypted communication tools, enabling device encryption, and using secure websites.

What is the risk of weak encryption?

Weak encryption can be easily cracked, making the data vulnerable to unauthorized access.


Safe Internet Usage: Best Practices

Safe internet usage involves adopting practices that protect your privacy, security, and personal information while browsing the web. It includes using strong passwords, avoiding suspicious websites, keeping software updated, and being aware of common online threats.

Questions and Answers:

What are some best practices for safe internet usage?

Best practices include using strong passwords, avoiding suspicious links, keeping software updated, and using security tools like antivirus and firewalls.

Why is it important to use strong passwords?

Strong passwords help protect your accounts from being easily accessed by unauthorized users.

What should you do if you receive a suspicious email?

Do not click on any links or attachments, and report the email as phishing if possible.

How can updating software contribute to safe internet usage?

Updating software helps protect against vulnerabilities that cyber attackers may exploit.

What is the importance of using a secure connection when entering personal information online?

A secure connection (e.g., HTTPS) ensures that the data you enter is encrypted and protected from interception.

How can you recognize a secure website?

A secure website will have “https://” in the URL and often a padlock icon in the address bar.

What is the role of a firewall in safe internet usage?

A firewall monitors and controls incoming and outgoing network traffic, helping to block unauthorized access.

What should you do to protect your privacy on social media?

Adjust privacy settings, limit the sharing of personal information, and be cautious about accepting friend requests from unknown individuals.

Why should you avoid using public Wi-Fi for sensitive transactions?

Public Wi-Fi networks are often unsecured, making it easier for attackers to intercept your data.

What is the risk of downloading files from untrusted sources?

Downloading from untrusted sources can lead to the installation of malware or viruses on your device.

Comments (0)

Leave a Reply

Your email address will not be published. Required fields are marked *