1.2.2 Security Aspects Flashcards

Communication and internet technologies

1
Q

Define hacking, its effects and how it can be removed:

A

Hacking is the act of gaining illegal access to a computer system, leads to identity theft and data can be deleted or corrupted or changed. Can be removed by using strong passwords, use of anti hacking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between hacking and cracking?

A

Cracking is where someone edits a programs code to bypass licenses and payment, malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define viruses, its effects and how it can be removed:

A

Can replicate themselves with intention of deleting or corrupting files, can cause computer to crash and can delete corrupt data. To remove use a anti virus, don’t use unknown software and be careful opening emails from unknown sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define wardriving, its effects and how it can be removed:

A

The act of locating and using wireless internet connections illegally. Possible to steal internet time and hack into network and steal users password. To remove use firewalls and complex passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define spyware, its effects and how it can be remove:

A

Gathers key presses and personal data, access to all data entered and able to read cookie data and install other spyware. Use anti spyware and use mouse to select passwords rather than typing them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define phishing, its effects and how it can be removed:

A

Legitimate looking email, link redirects to fake site. Creator can gain personal data through fake site and identity theft. Be careful opening links and attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define pharming, its effects and how it can be removed:

A

Malicious code installed on users hard drive/webserver redirect users to fake bogus site. Personal data stolen and identity theft. Anti-spyware and be alert on the look for clues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly