Security in IT
Physical security
Password security
Malware
100

Definition of IT security

IT security is a set of cybersecurity strategies that prevents unauthorized access to organizational assets such as computers, networks and data.

100

Definition of physical security

Physical security is the protection of personnel, hardware, software, networks and data from physical actions and events that could cause serious loss or damage to an enterprise, agency or institution. This includes protection from fire, flood, natural disasters, burglary, theft, vandalism and terrorism.

100

Definition of password security

Password security is essential to protect your accounts and personal information from unauthorized access.

100

What is malware?

Malware, or malicious software, is any program or file that is intentionally harmful to a computer, network or server.

200

What is included in the threats to IT security?

A common threat is malware, or malicious software, which may come in different variations to infect network devices, including: Ransomware, Spyware, Viruses.

200

Types of physical security

Access control, Surveillance, Testing, Log and trail maintenance, Risk-based approach, Accountable access control.

200

Tips for creating secure passwords

1) Use strong password (12 characters long, mix of upper and lowercase letters, numbers and symbols).

2) Never use the same password for multiple accounts.

3) Change your passwords regularly.

4) Enable two-factor authentication.

5) Use password manager.

200

Types of malware

Computer viruses, worms, Trojan horses, ransomware, spyware.

300

Types of IT security

Network security, Internet security, Endpoint security, Cloud security, Application security.

300

What is access control?

The key to maximizing one's physical security measures is to limit and control what people have access to sites, facilities and materials. Access control encompasses the measures taken to limit exposure of certain assets to authorized personnel only. Examples of these corporate barriers often include ID badges, keypads and security guards. However, these obstacles can vary greatly in terms of method, approach and cost.

300

Types of password attacks

Brute force attacks, dictionary attacks, phishing attacks.

300

Unique traits of worm

A worm can self-replicate without a host program and typically spreads without any interaction from the malware authors.

400

What is network security?

Network security is used to prevent unauthorized or malicious users from getting inside your network. This ensures that usability, reliability, and integrity are uncompromised. This type of security is necessary to prevent a hacker from accessing data inside the network. It also prevents them from negatively affecting your users’ ability to access or use the network.

400

What is Accountable access control?

By tying access control to individuals, an organization can improve its visibility over personnel activity. Imagine a particular room can only be accessed by a single key, and that key is given to two people. If an asset in that room goes missing, then only those two people are accountable for its disappearance.

400

Tips of hardware security and maintenance

1) Use anti-theft devices (cable lock).

2) Protect against power surges (use a surge protector).

3) Keep ypur devices clean.

400

Unique traits of spyware

Spyware collects information and data on the device and user, as well as observes the user's activity without their knowledge.

500

What is Endpoint security? 

Endpoint security provides protection at the device level. Devices that may be secured by endpoint security include cell phones, tablets, laptops, and desktop computers. Endpoint security will prevent your devices from accessing malicious networks that may be a threat to your organization.

500

What is application security?

Application security is a technique to protect applications and programming interfaces (APIs) to stop, identify the bugs and other intrusions in your applications. Application security characteristics contain documentation, authorization, encoding, and application security checking.

500

How protect personal information and prevent identity theft on the Internet

1) Use a secure connection (HTTPS).

2) Use antivirus software.

3) Be careful with email attachments.

4) Use strong passwords.

5) Be cautious with personal information.

500

What are the ways to get infected with malware?

Malware can get onto your device when you open or download attachments or files, download content available on file-sharing sites, or visit a scammy website.

M
e
n
u