Topics

Search This Blog

Monday, March 17, 2025

Computer Security

 VERY SHORT ANSWER:

Computer Security



1.       What is computer security?

Protection of computer systems

2.       What is data security?

Protection of stored data

3.       What is information security?

Safeguarding digital information

4.       What is authentication?

User identity verification

5.       What is authorization?

Access permission control

6.       What is a computer virus?

Malicious self-replicating program

7.       What is an antivirus?

Software to detect and remove viruses

8.       What is malware?

Harmful software programs

9.       What is ransomware?

Malware demanding payment

10.   What is spyware?

Software that secretly tracks users

11.   What is a trojan horse?

Disguised harmful software

12.   What is a worm?

Self-replicating malware

13.   What is phishing?

Fake email scam

14.   What is social engineering?

Tricking people for information

15.   What is a brute force attack?

Password guessing technique

16.   What is a denial-of-service (DoS) attack?

Overloading a network/server

17.   What is SQL injection?

Database hacking method

18.   What is a zero-day attack?

Exploiting unknown vulnerabilities

19.   What is keylogging?

Recording keystrokes

20.   What is cyber espionage?

Spying through hacking

21.   What is encryption?

Data scrambling for security

22.   What is decryption?

Converting encrypted data

23.   What is a firewall?

Network security barrier

24.   What is a proxy server?

Intermediary for secure browsing

25.   What is an intrusion detection system (IDS)?

Detects unauthorized access

26.   What is an intrusion prevention system (IPS)?

Blocks unauthorized access

27.   What is multi-factor authentication (MFA)?

Multiple security layers

28.   What is biometric authentication?

Fingerprint/face scan security

29.   What is a security patch?

Software vulnerability fix

30.   What is ethical hacking?

Legal security testing

31.   What is a virtual private network (VPN)?

Secure private browsing

32.   What is a honeypot in security?

Trap for cyber attackers

33.   What is public-key cryptography?

Two-key encryption system

34.   What is a digital signature?

Electronic document authentication

35.   What is a secure socket layer (SSL)?

Website data encryption

36.   What is transport layer security (TLS)?

Improved version of SSL

37.   What is an access control list (ACL)?

List of allowed users

38.   What is a session hijacking attack?

Stealing user session

39.   What is a DNS spoofing attack?

Fake website redirection

40.   What is wireless security?

Protection of Wi-Fi networks

41.   What is cybersecurity?

Protection from cyber threats

42.   What is cyber law?

Legal framework for cyberspace

43.   What is data privacy?

Protection of personal data

44.   What is digital forensics?

Investigation of cyber crimes

45.   What is a cyber attack?

Malicious digital activity

46.   What is insider threat?

Security risk from employees

47.   What is a cybersecurity framework?

Security best practices

48.   What is cloud security?

Protecting online data storage

No comments:

Post a Comment

Map of Nepal

 नेपालको नक्सा:  नेपालको नक्सा: नेपालको नक्सा: नेपालको नक्सा: नेपालको नक्सा: नेपालको नक्सा: नेपालको नक्सा:

Most viewed!