8. Security and ethics Flashcards

(49 cards)

1
Q

What is hacking?

A

The act of gaining illegal access to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are viruses?

A

Program or program code that can replicate itself with the intention of deleting or corrupting files or cause the computer to malfunction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is phishing?

A

The creator sends out a legitimate looking email in order to obtain confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pharming?

A

Code installed on the user’s hardware or on the web server that redirects the user to a fake website without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is wardriving?

A

Act of locating and using wireless internet connections illegally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware/key-logging software?

A

Software that gathers information by monitoring key presses on the user’s keyboard; the information is then sent back to the person who sent the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the possible effects of hacking?

A

Identity theft

Data can be deleted, changed or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the possible effects of viruses?

A

Can cause the computer to crash, stop functioning normally or become unresponsive
Data can be deleted, changed or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the possible effects of phishing?

A

Sender can gain info such as bank account numbers
Identity theft
Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the possible effects of pharming?

A

Can gain info such as bank account numbers
Identity theft
Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the possible effects of wardriving?

A

Possible to steal a user’s internet time to download large files
Can steal a user’s password and personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the possible effects of spyware?

A

Can gain info such as bank account numbers

Able to install other spyware, read cookie data and change default web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What methods can be used to prevent hacking?

A

Firewalls
Strong passwords and user ids
Anti-hacking software
(Encryption wont stop hacking but will make the data useless to the hacker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What methods can be used to prevent viruses?

A

Anti-virus software
Not using software from unknown sources
Being careful when opening email attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What methods can be used to prevent phishing?

A

ISPs often filter out phishing emails

Being careful when opening email attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What methods can be used to prevent pharming?

A

Anti-spyware software

Be alert and look for clues that the website is not legitimate e.g. https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What methods can be used to prevent wardriving?

A

Use wired equivalent privacy (WEP) encryption
Use strong passwords
Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What methods can be used to prevent spyware?

A

Anti-spyware software

Use a mouse to select keys for passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are cookies?

A

Packets of data that collect information about the user’s habits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why are cookies used?

A

So that companies can display adverts that may be of interest to the user.

21
Q

How can you prevent accidental loss of data?

A

Backups
Save data regularly
Use passwords to restrict access to authorised users only

22
Q

How can you prevent data loss through hardware fault (such as head crash on HDD)

A

Backups
Save data regularly
Use uninterruptable power supply

23
Q

How can you prevent data loss through software fault?

A

Backups

Save data regularly

24
Q

How can you prevent data loss due to incorrect computer operation?

A

Backups

Good training procedures

25
What does a firewall do?
Check whether data meets a set of criteria and if doesn't block the traffic and give the user a notification Logging all traffic to allow later interrogation Keep a list of undesirable IP addresses created by the user Helping prevent viruses and hacking
26
What does a proxy server do?
Acts as a firewall Keeps IP address secret Uses a cache so that the user can connect to a website faster
27
How does SSL work?
The web browser sends a message to the server requesting that it identifies itself The server responds by sending a copy of its SSL certificate If the web browser can authenticate the certificate it sends a message to the server to allow communication to begin One this message is received the server acknowledges the browser and the data transfer can begin
28
What is the purpose of TLS?
Provides encryption and authentication to prevent hacking.
29
What are the two layers of TLS?
Record protocol - contains the data being transferred over the internet Handshake protocol - allows the website and the user to authenticate each other and use encryption algorithms
30
What are the differences between TLS and SSL?
Possible to extend TLS by adding new authentication methods TLS makes use of session chaching TLS separates the handshaking process from the record layer
31
What is the advantage of using session caching?
Opening a TLS session requires a lot of computer time but caching allows the user to start or resume a session which is faster.
32
What is symmetric encryption?
Uses 2 secret keys, 1 to encrypt and 1 to decrypt
33
What is a problem with symmetric encyption?
Key distribution problem - keys could be interpreted by a user
34
How can the key distribution problem be solved using symmetric encryption?
Algorithms which create a key using random numbers chosen by the sender and receiver
35
How does asymmetric encryption work?
User A applies a symmetric key The symmetric key is encrypted using the public key User a sends the message with the encrypted key User B decrypts the symmetric key by applying their private key The symmetric key is used to decrypt the message sent by A
36
How can the user increase the security of encryption?
Increase the length of the key - lots more possible keys
37
What is authentication?
Used to verify that data comes from a trusted source
38
Examples of authentication
Passwords, digital signatures, biometrics
39
How do digital signatures work?
User writes a message Message put through hashing algorithm The hash number is encrypted using a private key The message and hash number are sent over the internet The hash number is decrypted using a public key The hash number is compared with the message to see if the message has been altered
40
Types of biometric
Fingerprint scans, retina scans, face recognition, voice recognition
41
What is a denial of service attack?
An attempt to prevent users from accessing part of a network by repeatedly bombarding the server with requests
42
What effects can a DOS attack have?
Prevent a user from accessing emails, websites or online services
43
How can a user guard against DOS attacks?
Use up to to data malware checking software Use a firewall Apply email filters
44
Signs a DOS is happening
Slow network performance Unavailability of a website Large amounts of spam email
45
Ways a bank protects customers' information
``` 10-12 digit code Input random numbers from pin/password Card reader - generates a code from an internal clock and the PIN Insert password using drop down boxes Ask for personal data ```
46
What is free software?
Users can copy, change or adapt it.
47
What is freeware?
Software a user can download for free without further charges but they cannot study or modify the source code.
48
What is shareware?
A free trial of a software which, after a period of time, the user will be asked to pay for.
49
What can a user do with free software?
Run it for any legal purpose Study the source code and modify it to meet their needs Pass the software in original or modified form to other people