Cyberspace, network security and data transfer Flashcards

1
Q

What is Cyber Crime?

A

Using a computer to commit a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Hacking

A

Gaining unauthorised access to a computer with the intention of corrupting or stealing data stored on a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Pornography

A

Hiding malware when someone downloads adult content which increases the risk of someone’s data being corrupted by a virus or stolen by an unauthorised data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Cyber Stalking

A

Using technology to harass others such as sending inappropriate emails or making inappropriate comments on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Data Theft

A

Theft of personal data which are then used to commit identity theft, eg passport applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Denial of Service

A

A malicious attack on a network, eg preventing users from logging on to access their data or email accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Digital Forgery

A

Intentionally and falsely altering digital content. eg changing passport photographs and sell to criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Cyber Defamation

A

Using the internet to intentionally damage the reputation of a person or organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Spamming

A

Spamming is sending junk emails as a result the inbox becomes overloaded and time is wasted opening and reading such emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Phishing

A

Sending emails that appear to be from a reliable source asking recipients to update their personal information which is then used by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Malware

A

Malware is a malicious software that is downloaded onto a computer unintentionally by using the internet or from email attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Virus

A

Virus is a program that attaches itself into a file and once the file is opens it spreads itself to different computers on the same network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Trojan Horse

A

Trojan horse gains entry to a user’s computer in disguise and tricks the user by encouraging them to open and download a software program that they require.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain Worms

A

Worms spread around a computer system by replicating itself. Spreads around the network without the need to be attached to any to any document or program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain Keylogger

A

Designed to record keyboard activities performed by users(known as ‘keystrokes’)
Keystrokes are saved as log file and then sent to the person who created the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Main Purpose of Keyloggers

A

Steal Banking Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Main Purpose of Trojan Horses

A

Deleting Data Files

18
Q

Explain Spyware

A

Software is secretly installed on a user’s computer from the internet

19
Q

What does Spyware do?

A

Tracks user activities
Example credit card and password details when used on websites

20
Q

Explain Data Encryption

A

Uses special software to encode(converted into a code form) or scramble data before it is transmitted

21
Q

What does Data Encryption do?

A

This makes the data unreadable or meaningless if intercepted
Users with the encryption key software can unscramble the data when it arrives at its destination

22
Q

Explain Usernames and Password

A

users on a network are allocated a unique user ID and a randomly generated passwords
Each time a user logs on the system checks their user ID and password to grant the user access to data

23
Q

Why should a user have a strong password

A

To help reduce data theft

24
Q

How to make a password secure?

A

Regularly changed

at least 8 characters, one uppercase characters

atleast one special character such as #$?

25
Explain what a network manager has control over?
Who has been on the network Location of the Computer
26
Explain Access Levels
Users are allocated different levels of access to files Types of Access: Read Only Read and Copy Read and Write
27
What happens if user doesn't have the correct level of access?
They will be denied access
28
What is a backup?
A backup is a copy of an original fine just in case it is deleted accidently or corrupted
29
Explain Backup
If data is lost or damaged, the network should have a method of recovering the data Network backups are scheduled to run at certain times,example end of each day
30
Explain Firewalls
Firewalls monitor and filter data entering or leaving a network Blocks data which do not obey the organisation rules
31
Expand FTP
File Transfer Protocol
32
Explain FTP
File Transfer Protocol allows uses to download or upload files over internet Encryption is Used for Safety
33
What is a Protocol?
A set of rules to allow for communication between two different computer systems
34
Expand HTTP
Hypertext Transfer Protocol
35
Explain HTTP
Hypertext Transfer protocol is used by www to transfer webpages over the internet
36
What will the HTTP report if webpage isnt found?
Error 404 not found is displayed
37
Expand HTTPS
Hypertext Transfer Protocol Secure
38
Explain HTTPS
Hypertext Transfer Protocol Secure uses SSL to ensure data is transmitted securely over the internet Uses Encryption for sending data Uses Decryption for receiving data
39
What is the main use of HTTPS
Financial transactions
40
What do worms do?
Slow data transmission speeds