COMPUTER THREATS SECURITY
WHAT IS COMPUTER SECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
True
|
|
False
|
|
Either A or B
|
|
None of the above
|
Detailed explanation-1: -Misconfigured access rights Access rights set up what can and cannot be seen when someone logs into a system. If these are not set up correctly in an email server, a person may be able to see someone else’s emails. If a person accesses an account that they do not have permission to see, they might be breaking the law.
Detailed explanation-2: -Misconfigured Access Rights are when user accounts have incorrect permissions. The bigger problem from this could be giving people who are lower down the chain of command access to private information that managers could have. They could wrongly have access to employee records or customer data.
Detailed explanation-3: -The four main types of vulnerabilities in information security are network vulnerabilities, operating system vulnerabilities, process (or procedural) vulnerabilities, and human vulnerabilities.
Detailed explanation-4: -Weak and Default Passwords However, a lock is only as strong as the key, and using easy to guess passwords means that a would-be cracker or hacker may be able to get into the system with a lucky guess.