Chapter 8 - Security and Ethics Flashcards Preview

Computer Science CIE iGCSE > Chapter 8 - Security and Ethics > Flashcards

Flashcards in Chapter 8 - Security and Ethics Deck (29)
Loading flashcards...
1

What is hacking?

the act of gaining illegal access to a computer system

2

What is cracking?

the editing of program source code so it can be exploited/changed for a specific purpose

3

What are viruses?

program code that can replicate/copy itself with the intention of deleting/corrupting data/files or causing the computer to malfunction

4

What is phishing?

sending legitimate lookng emails to encourage uses to give out personal data

5

What is pharming?

malicious code installed to redirect uses to a fake website

6

What is spyware/key logging software?

gathers data by monitoring keypresses on user's keyboards

7

What are cookies?

pieces of data that allow detection of web pages viewed by a user and store their preferences

8

What is accidental or malicious loss of data?

this could be due to accidentally deleting a file or to a malicious attack from viruses or hacking

9

What are firewalls?

examines traffic between user's computer and a public network - can help prevent viruses or hackers entering a user's computer

10

What is secure sockets layer (SSL)?

allows data to be sent and received securely across a network

11

What is transport layer security (TLS)?

a protocol that is designed to ensure that no third party may eavesdrop or tamper with any message

12

What is symmetric encryption?

a secret key which makes a message unreadable unless the recipient also has the decryption key

13

What is asymmetric encryption?

a form of encryption requiring both a public and private key

14

What is authentication?

used to verify that data comes from a trusted source

15

What is a denial of service attack?

an attempt at preventing users from accessing part of a network

16

What are ethics?

a set of principles set out to regulate the use of computers

17

What is free software?

users have the freedom to run, copy, change or adopt free software

18

What is freeware?

software which users can download free of charge

19

What is shareware?

users are allowed to try out shareware for a trial period

20

What can hacking lead to?

lead to identity theft and loss or corruption of data

21

How can you minimise the risk of hacking?

using strong passwords
using firewalls

22

Why is cracking done?

for malicious purposes (such as modifying legitimate software to do something like redirect a user to a fake website)

23

How can you minimise the risk of cracking?

it is hard to do
software engineers need to make the act of breaking into the software nearly impossible (make it difficult to identify back doors)

24

What do viruses cause computers to do?

run slow
crash
cause some software to run abnormally

25

How to reduce the risk of viruses?

running anti-virus software
don't open emails/software from unknown sources

26

What are the main signs that an email is a phishing email?

messages containing poor spelling/grammar
asks for personal information
unrealistic threats/promises made

27

How can you reduce the risk of pharming?

anti-spyware software can identify and remove pharming code on the hard drive

28

What is wardriving?

the act of locating and using wireless internet connections illegally
can lead to stealing of internet time/bandwith

29

How can you prevent the risk of wardriving?

use of WEP (wired equivalent privacy) encryption
complex passwords
firewalls