FUNDAMENTALS OF COMPUTER

COMPUTER THREATS SECURITY

WHAT IS COMPUTER SECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Weak Passwords, misconfigured access rights, removable media, unpatched or outdated software, social engineering techniques and malicious code are All cyber security threats to businesses and organisations?
A
True
B
False
C
Either A or B
D
None of the above
Explanation: 

Detailed explanation-1: -Misconfigured access rights Access rights set up what can and cannot be seen when someone logs into a system. If these are not set up correctly in an email server, a person may be able to see someone else’s emails. If a person accesses an account that they do not have permission to see, they might be breaking the law.

Detailed explanation-2: -Misconfigured Access Rights are when user accounts have incorrect permissions. The bigger problem from this could be giving people who are lower down the chain of command access to private information that managers could have. They could wrongly have access to employee records or customer data.

Detailed explanation-3: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.

Detailed explanation-4: -Weak and Default Passwords However, a lock is only as strong as the key, and using easy to guess passwords means that a would-be cracker or hacker may be able to get into the system with a lucky guess.

There is 1 question to complete.