⌨️Computer Science 1 Flashcards
Paper 1 and 2
comp 1.5: what are the 3 types of system software
utility/application software, device drivers, operating software
comp 1.5: what does the operating system do
a piece of software that controls system hardware, it has mangers for each piece of hardware
comp 1.5: name all of the managers used by the operating system
memory manager, user manager, process manager, file manager
comp 1.5: what is a CLI
it is a command line interface
comp 1.5: what is a GUI
it is a graphical user interface
comp 1.5 what is a WIMP
stands for Windows Icons Mice and pull down menus, it is a system of software features designed to simplify system operation for the user
comp 1.5: name 4 types of utility software
defragmentation, encryption, compression, backup
comp 1.5: what is a single user OS
it is an operating system interned to only have a single user at a time, although more than one user can use the OS at different times, the user manager keeps track of this
comp 1.4: what is social engineering
someone being influenced into giving away info that could grant access to accounts
comp 1.4: what is an insider attack
it is an attack by someone on the inside where the give away vunerable info
comp 1.4: what is an active attack
using a technical method, such as malware or other to compromise a networks security
comp 1.4: what is a passive attack
this is an attack where attackers eavesdrop by ‘sniffing’ data packets
comp 1.4: what is a penetration test
this is where an organization performs a controlled attack on itself to identify its weak spots, this can be performed by ‘ethical hackers’
comp 1.4: name all of the types (7) of malware
- viruses - program in a program that spread
- worms - code that spreads across a network without a host
- trojan hoarse - pretends to be a program its not
- ransomware - encrypts data on system, only decrypts when money is sent
- spyware - tracks activity and gathers info
- rootkit - modifies OS so antivirus does not work
- backdoor - opens access to a computer that another malware takes advantage of
comp 1.4: what are firewalls and what do they do
they are either hardware or software that ‘sits’ between the user and the internet that filter packets
comp 1.4: what are the 4 types of active attacks
- brute force - tries many combos of numbers and letters to find a password, this is slow
- dictionary - tries many common passwords
- DoS - denial of service attack, floods a server with many useless requests, can be blocked by a firewall blocking a certain ip,
- DDoS - distributed denial of service attack, used to unban an ip, requests are sent from a botnet
comp 1.4: what methods do firewalls use to filter packets
- ip filtering - the set of properties that identify a packet, together with the action to be performed on it, is known as an IP filter rule
- packet filtering - inspects data packets to see whether they meet a certain criteria
- port blocking - blocks certain ports that can be used by hackers to gain access, such as port 22
comp: what is a protocol
a set of rules for transferring data
comp 1.4 what are the 4 methods of data interception
- MITM - a man in the middle attack intercepts data by intercepting the users connection to the internet and viewing network traffic
- insider attack
- packet sniffing - a hacker intercepting data transfered across a network
- SQL - structured query language, this is an attack where lines of code are inserted into a field in the website/other
comp 1.4: what are botnets
they are many machines infected with malware that can be used for DDoS attacks
comp 1.3: what is a switch in networks
it is a device that connects serval devices to make a wired network
comp 1.3: what is a network layer
they break up the sending of packets into different components, each component handles a different part of the communication(TCP/IP model)
comp 1.3: what is a NIC
a network interface controller is a device that provides connection between a device and the network
comp 1.3: what is a router
this is a piece of hardware that connects networks together