Need of Cyber Security

Need of Cyber Security


Cyber security is needed for following reasons:

The protection of information and information systems against unauthorized access or modification of information, whether in storage, processing, or transit to authorized users. Information security includes those measures necessary to detect, document, and counter threats to digital and non-digital information. Information security processes and policies typically involve physical and digital security measures to protect data from unauthorized access.

Security: It can be considered a state of freedom from a danger or risk. For example, a nation experiences security when it’s military has the strength to protect its citizens.

Information: It is an asset to all individuals and businesses. Information Security refers to the protection of these assets in order to achieve Confidentiality, Integrity and Availability (CIA).

To make the system secure, optimum level of confidentiality, availability and integrity is to be maintained. 

Meaning of Confidentiality, Integrity and Availability (CIA):

Confidentiality: Protecting information from being disclosed to unauthorized parties.

Integrity: Protecting information from being changed by unauthorized parties.

Availability: To the availability of information to authorized parties only when requested.

Three main goals of Information security are:

Detection: The most important element of this strategy is timely detection and notification of a compromise. Intrusion detection systems (IDS) are utilized for this purpose.

Prevention: Security measures must be taken to protect information from unauthorized modification, destruction, or disclosure whether accidental or intentional

Response: Making important decisions or developing policy while under attack is a recipe for disaster.


Qus. 1 : A passive threat to computer security is

  1. Malicious Intent
  2. Sabotage
  3. Accident Errors
  4. Espionage Agents
Qus. 2 : The circuit used to store one bit of data is known as

  1. Register
  2. Encoder
  3. Decoder
  4. Flip Flop
Qus. 3 : What is a good way to protect sensitive information sent via e-mail?

  1. Write it in another language
  2. Keep the message in attachment
  3. Encrypt the message
  4. Send as a blind copy
Qus. 4 : Which of the following is NOT considered to be malware?

  1. viruses
  2. spyware
  3. worm
  4. adware
Qus. 5 : Copyright law protects

  1. Tangible property
  2. Intangible property
  3. The name of a particular good or service
  4. Ideas contained in varied forms of expression
Qus. 6 : Which is not firewall technique?

  1. Packet Filter
  2. Application Gateways
  3. Proxy Server
  4. Fire Proxy Service

Programs

CCC Online Test Python Programming Tutorials Best Computer Training Institute in Prayagraj (Allahabad) Online Exam Quiz O Level NIELIT Study material and Quiz Bank SSC Railway TET UPTET Question Bank career counselling in allahabad Best Website and Software Company in Allahabad Website development Company in Allahabad