Cyberspace, network security and data transfer Flashcards

1
Q

What is Cyber Crime?

A

Using a computer to commit a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Hacking

A

Gaining unauthorised access to a computer with the intention of corrupting or stealing data stored on a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Pornography

A

Hiding malware when someone downloads adult content which increases the risk of someone’s data being corrupted by a virus or stolen by an unauthorised data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Cyber Stalking

A

Using technology to harass others such as sending inappropriate emails or making inappropriate comments on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Data Theft

A

Theft of personal data which are then used to commit identity theft, eg passport applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Denial of Service

A

A malicious attack on a network, eg preventing users from logging on to access their data or email accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Digital Forgery

A

Intentionally and falsely altering digital content. eg changing passport photographs and sell to criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Cyber Defamation

A

Using the internet to intentionally damage the reputation of a person or organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Spamming

A

Spamming is sending junk emails as a result the inbox becomes overloaded and time is wasted opening and reading such emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Phishing

A

Sending emails that appear to be from a reliable source asking recipients to update their personal information which is then used by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Malware

A

Malware is a malicious software that is downloaded onto a computer unintentionally by using the internet or from email attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Virus

A

Virus is a program that attaches itself into a file and once the file is opens it spreads itself to different computers on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Trojan Horse

A

Trojan horse gains entry to a user’s computer in disguise and tricks the user by encouraging them to open and download a software program that they require.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain Worms

A

Worms spread around a computer system by replicating itself. Spreads around the network without the need to be attached to any to any document or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain Keylogger

A

Designed to record keyboard activities performed by users(known as ‘keystrokes’)
Keystrokes are saved as log file and then sent to the person who created the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Main Purpose of Keyloggers

A

Steal Banking Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Main Purpose of Trojan Horses

A

Deleting Data Files

18
Q

Explain Spyware

A

Software is secretly installed on a user’s computer from the internet

19
Q

What does Spyware do?

A

Tracks user activities
Example credit card and password details when used on websites

20
Q

Explain Data Encryption

A

Uses special software to encode(converted into a code form) or scramble data before it is transmitted

21
Q

What does Data Encryption do?

A

This makes the data unreadable or meaningless if intercepted
Users with the encryption key software can unscramble the data when it arrives at its destination

22
Q

Explain Usernames and Password

A

users on a network are allocated a unique user ID and a randomly generated passwords
Each time a user logs on the system checks their user ID and password to grant the user access to data

23
Q

Why should a user have a strong password

A

To help reduce data theft

24
Q

How to make a password secure?

A

Regularly changed

at least 8 characters, one uppercase characters

atleast one special character such as #$?

25
Q

Explain what a network manager has control over?

A

Who has been on the network
Location of the Computer

26
Q

Explain Access Levels

A

Users are allocated different levels of access to files
Types of Access:
Read Only
Read and Copy
Read and Write

27
Q

What happens if user doesn’t have the correct level of access?

A

They will be denied access

28
Q

What is a backup?

A

A backup is a copy of an original fine just in case it is deleted accidently or corrupted

29
Q

Explain Backup

A

If data is lost or damaged, the network should have a method of recovering the data
Network backups are scheduled to run at certain times,example end of each day

30
Q

Explain Firewalls

A

Firewalls monitor and filter data entering or leaving a network

Blocks data which do not obey the organisation rules

31
Q

Expand FTP

A

File Transfer Protocol

32
Q

Explain FTP

A

File Transfer Protocol allows uses to download or upload files over internet
Encryption is Used for Safety

33
Q

What is a Protocol?

A

A set of rules to allow for communication between two different computer systems

34
Q

Expand HTTP

A

Hypertext Transfer Protocol

35
Q

Explain HTTP

A

Hypertext Transfer protocol is used by www to transfer webpages over the internet

36
Q

What will the HTTP report if webpage isnt found?

A

Error 404 not found
is displayed

37
Q

Expand HTTPS

A

Hypertext Transfer Protocol Secure

38
Q

Explain HTTPS

A

Hypertext Transfer Protocol Secure uses SSL to ensure data is transmitted securely over the internet
Uses Encryption for sending data
Uses Decryption for receiving data

39
Q

What is the main use of HTTPS

A

Financial transactions

40
Q

What do worms do?

A

Slow data transmission speeds