Chapter 7 - Cyberspace, network security and data transfer Flashcards

(44 cards)

1
Q

What is cyber crime?

A

Using a computer to commit a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are cyber criminals?

A

People involved in cyber crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give an example of cyber crime

A

Hacking bank accounts
Phishing
Theft of personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hacker?

A

A person who gains unauthorised access to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a virus?

A

Software designed to damage a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is cyber stalking?

A

Where individuals use technology to harass others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Social Media?

A

Websites and computer programs that allow people to communicate and share information on the internet using a computer or mobile phone:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data theft?

A

Stealing customer records to get personal details that are then used to commit identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is identity fraud?

A

Using someone else’s personal details to commit a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DDoS stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DDoS?

A

A malicious attack on a network, sending so much traffic to a target that it can no longer access the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a web server?

A

Web servers are computers that store website data, and deliver web pages to internet users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is digital forgery?

A

Intentionally and falsely altering digital content. e.g. pictures or documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cyber defamation?

A

Using the internet with the intention to damage the reputation of a person or organisation by posting slanderous messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is slander?

A

Making a false statement that damages a person’s reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spamming?

A

Sending bulk junk emails such as adverts for products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Phishing?

A

Sending emails that appear to be from a reliable source that attempt to trick the recipient into revealing personal details or account information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is identity theft?

A

Stealing someone’s identity to commit a crime

19
Q

What is malware?

A

MALicious SoftWARE (malicious means bad)

20
Q

What is a Trojan Horse?

A

Malicious software that gains access to a computer by pretending to be a useful piece of software

21
Q

What is a worm?

A

Malware that spreads by replicating (copying) itself

22
Q

What is a key logger?

A

Software that records what a user types and sends it to a cyber-criminal

23
Q

What is spyware?

A

Malicious software secretly installed on a computer that collects information about a user and sends it to a cyber-criminal

24
Q

What is encryption?

A

Transmitted data is ‘scrambled’ so that it cannot be understood if it is intercepted.
The data can only be unscrambled (unencrypted) by using an encryption key

25
What is verification?
Checking if something is true or accurate
26
What are access levels?
Different users are given different access to data on a network. E.g. Teachers might be able to see a student's contact information, but a student can only see their own data.
27
What access levels can be applied to a file?
Read-only Read & copy Read & Write
28
What is read-only access?
The file can only be read, not changed
29
What is read-copy access?
The file can be read and a copy made, but the original cannot be changed
30
What is read-write access?
The file can be read, changed and saved
31
What is data corruption?
When data becomes unusable, unreadable or inaccessible to a user or application
32
What is a restore program?
A program that restores damaged files from a backup
33
What is a firewall?
A hardware device or software program that monitors data entering and leaving a network
34
What does TCP/IP stand for?
Transmission Control Protocol / Internet Protocol
35
What is TCP/IP?
The protocols used to transfer data on the internet
36
What does FTP stand for?
File Transfer Protocol
37
What is FTP?
A protocol that allows files to be sent and received on the internet
38
What is a 404 error?
An error that occurs when a webpage of file cannot be found on the internet
39
What does HTTPS stand for?
HyperText Transfer Protocol Secure
40
When is HTTPS used?
HTTPS is used to ensure that data is transmitted securely on the internet, especially for banking or payment appications.
41
What does SSL stand for?
Secure Socket Layer
42
What is SSL?
SSL makes an encrypted connection between a browser and a server
43
What is a web browser?
A piece of software that displays web pages
44
What is e-commerce?
Online shopping Business transactions over the internet