SEE Final Revision & Practice Questions

Concise chapter-wise revision notes + SEE exam-style questions (very short, technical terms, full forms,short answers)


Chapter 3: Computer Security

1: Introduction to Computer Security

Definition: Computer security refers to the protection of data and information (stored or being transferred), computer programs, credentials, and computer hardware from intended harm, theft, unauthorized access, or unintended accidents/natural disasters.

Types:

Discussion: Emphasize why security is crucial in today's digital world, especially for students handling school projects or online activities. Mention that threats can be physical (e.g., theft) or non-physical (e.g., cyber-attacks).

2: Major Principles of Information Security (CIA Triad)

These principles form the foundation of InfoSec. For example, confidentiality prevents data leaks, integrity ensures data isn't tampered with, and availability keeps systems running during attacks.

CIA Triad Diagram
CIA Triad Diagram (Confidentiality, Integrity, Availability)

3: Hardware Security

Focuses on protecting physical components from damage, theft, or environmental factors.

4: Information Security Threats (Malware & Others)

Definition: Threats that can harm computer programs, data, and information. Can be physical (e.g., theft) or non-physical (e.g., cyber-attacks).

Malicious Code (Malware): Code designed by cyber attackers to damage data/systems or gain unauthorized access. Includes viruses, worms, Trojan horses, spyware, etc. Functions: stealing, encrypting, deleting data, hijacking functions, monitoring activity.

5: Threats - Types of Malware (Part 1)

6: Threats - Types of Malware (Part 2)

Victim → Phishing/Exploit → Infection → C2 Connection → Spread (Lateral) → Scan Files → Encrypt Files → Display Ransom Note → Payment Demand → (Pay or Not) → Attacker Decrypts (if paid)

7: Threats - Other Security Threats

8: Protection Mechanisms - Overview

Definition: Designed to detect, prevent, or recover from attacks. Includes authentication, firewalls, cryptography, antivirus, and backups.

How to Protect from Infection: Use firewall/antivirus, avoid untrusted emails/links, regular backups.

8.1: Protection - Authentication System

Definition: Verifies identity to ensure only authorized access.

Compare passwords (easy but crackable) vs. biometrics (secure but hardware-dependent).

8.2: Protection - Firewall

Firewall Network Diagram
Firewall in a Network Security Setup

8.3: Protection - Cryptography

Asymmetric Encryption Diagram
Symmetric vs Asymmetric Encryption Comparison

8.4: Protection - Antivirus Software

Antivirus Software Interface
Example of Antivirus Scan Interface (Avast-like)

8.5: Protection - Backup System

Definition: Creating duplicate copies of data/programs in secure locations to protect against corruption/loss.

Methods: USB flash drives, external hard drives, backup servers, cloud storage.

Discussion: Emphasize regular backups (e.g., to cloud or external drives) as a recovery tool.

Practice Questions for Computer Security Chapter (SEE Revision)

Section 1: Introduction to Computer Security

Very Short Questions
  1. What does computer security protect against?
  2. Name the two main types of computer security.
Technical Terms (Define in 1-2 sentences)
  1. Computer Security
  2. Information Security (InfoSec)
Full Forms
  1. CIA (in the context of Information Security)
  2. InfoSec
MCQs
  1. Which of the following is NOT a major principle of Information Security? a) Confidentiality b) Integrity c) Availability d) Accessibility
  2. Information Security protects data from: a) Unauthorized access only b) Misuse, disclosure, destruction, or disruption c) Natural disasters only d) Hardware failure
Fill in the Blanks
  1. Computer security refers to the protection of data, programs, and hardware from ________ harm, theft, or unauthorized access.
  2. The CIA principles stand for Confidentiality, ________, and Availability.
Short Questions
  1. Explain the CIA principles of Information Security with one example each.
  2. Differentiate between physical and non-physical security threats.

Activity: "CIA Triad Buzz": Find a good example for each (Confidentiality, Integrity, and Availability). You have 2 minutes to brainstorm real-life examples (e.g., a locked diary for confidentiality). Share and vote on the best example.

Answers

Very Short: 1. Intended harm, theft, unauthorized access, accidents. 2. Information Security, Hardware Security.

Technical Terms: 1. Protection of data, programs, credentials, and hardware from harm/theft/unauthorized access. 2. Protection of confidential/sensitive data from unauthorized access, misuse, or disruption.

Full Forms: 1. Confidentiality, Integrity, Availability. 2. Information Security.

MCQs: 1. d, 2. b.

Fill in the Blanks: 1. intended, 2. Integrity.

Short: 1. Confidentiality: Only authorized access (e.g., password-protected files). Integrity: Accurate modification (e.g., no tampering with exam scores). Availability: Data ready when needed (e.g., server uptime). 2. Physical: Stealing hardware; Non-physical: Virus attack via software.

Section 2: Hardware Security

Very Short Questions
  1. Name two power regulating devices.
  2. What is the ideal room temperature for computer hardware?
Technical Terms (Define in 1-2 sentences)
  1. UPS
  2. Regular Maintenance
Full Forms
  1. UPS
  2. CCTV
MCQs
  1. Which device protects against voltage spikes? a) UPS b) Volt Guard c) Spike Guard d) Air Conditioner
  2. Insurance in hardware security provides: a) Protection from dust b) Financial support if hardware is damaged/stolen c) Virus removal d) Data backup
Fill in the Blanks
  1. ________ particles can cause failure of hardware components, so keep the environment dust-free.
  2. Use fire alarms and extinguishers for protection from ________.
Short Questions
  1. List and explain three measures for hardware security from theft and fire.
  2. Why are power protection devices needed? Give examples.

Activity: "Hardware Hunt Game": Bring images of devices (UPS, Spike Guard, etc.) on the board or projector. Students race to identify and explain one in pairs.

Answers

Very Short: 1. UPS, Volt Guard, Spike Guard (any two). 2. 21°C to 24°C.

Technical Terms: 1. Uninterruptible Power Supply: Battery-supported device providing power during failures. 2. Keeping hardware in good condition to prevent severe damage (e.g., fixing CPU cooler).

Full Forms: 1. Uninterruptible Power Supply. 2. Closed Circuit Television.

MCQs: 1. c, 2. b.

Fill in the Blanks: 1. Dust, 2. fire.

Short: 1. Theft: Grills, locks, CCTV, alarms. Fire: Alarms, detectors, extinguishers. (Explain briefly). 2. To prevent damage from power issues; examples: UPS for backups, Spike Guard for spikes.

Section 3: Information Security Threats

Very Short Questions
  1. Name three types of malicious codes.
  2. What is a drive-by attack?
Technical Terms (Define in 1-2 sentences)
  1. Malware
  2. Phishing
  3. Keylogger
  4. Botnet
Full Forms
  1. HTTP (in botnet context)
  2. IoT
MCQs
  1. Which malware self-replicates without human interaction? a) Virus b) Worm c) Trojan Horse d) Spyware
  2. Social engineering involves: a) Hacking hardware b) Manipulating people for confidential info c) Encrypting data d) Backing up files
Fill in the Blanks
  1. A ________ virus infects system boot files.
  2. Ransomware ________ files and demands payment.
Short Questions
  1. Differentiate between a virus, worm, and Trojan horse.
  2. Explain how to protect a system from infection (list 3 ways).

Activity: "Threat Matching Relay": Write threats (e.g., Phishing, Rootkit) on cards and definitions on others. Students in teams relay to match them.

Answers

Very Short: 1. Virus, Worm, Trojan (any three from notes). 2. Spreading malware via insecure websites without user action.

Technical Terms: 1. Malicious code causing damage or unauthorized access. 2. Obtaining sensitive info by pretending to be trustworthy. 3. Records keystrokes secretly. 4. Network of compromised devices controlled by a bot master.

Full Forms: 1. Hypertext Transfer Protocol. 2. Internet of Things.

MCQs: 1. b, 2. b.

Fill in the Blanks: 1. boot/system, 2. encrypts.

Short: 1. Virus: Infects files/programs; Worm: Self-replicates; Trojan: Appears legitimate but malicious. 2. Use firewall/antivirus; Avoid untrusted emails/links; Regular backups.

Section 4: Protection Mechanisms

Very Short Questions
  1. Name two types of firewalls.
  2. What are the two main types of encryption?
Technical Terms (Define in 1-2 sentences)
  1. Cryptography
  2. Biometric Authentication
  3. Antivirus Software
  4. Backup System
Full Forms
  1. AES
  2. RSA
MCQs
  1. In asymmetric encryption, the decryption key is: a) Public b) Private c) Symmetric d) Shared
  2. Which is NOT a biometric example? a) Fingerprint b) Voice recognition c) Password d) Retina scan
Fill in the Blanks
  1. Symmetric encryption uses ________ key for both encryption and decryption.
  2. A strong password should mix alphabets, numbers, and be changed ________.
Short Questions
  1. Explain symmetric vs. asymmetric cryptography with examples.
  2. List four criteria for a strong password and why backups are important.
Answers

Very Short: 1. Hardware, Software. 2. Symmetric, Asymmetric.

Technical Terms: 1. Securing communications via encryption/decryption. 2. Using unique human traits (e.g., fingerprints) for identity verification. 3. Detects/removes viruses/malware. 4. Creating duplicate data copies for recovery.

Full Forms: 1. Advanced Encryption Standard. 2. Rivest-Shamir-Adleman.

MCQs: 1. b, 2. c.

Fill in the Blanks: 1. one/same, 2. regularly.

Short: 1. Symmetric: One key (e.g., AES); Asymmetric: Public/private keys (e.g., RSA). 2. Not guessable, mix chars, change regularly, avoid popular words; Backups prevent data loss from corruption/attacks.

Note: This is the starting chapter for final revisions. More chapters will be added below in coming days.