cyberspace, network security and data transfer Flashcards

1
Q

What is Cyber Crime?

A

Using a computer to commit a crime

This includes viruses and other cyber crimes such as theft of personal information, stealing money from credit cards and theft of company data that could be sold to competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Explain Hacking

A

Gaining unauthorised access to a computer with the intention of corrupting or stealing data stored on a hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain Cyber Stalking

A

Using technology to harass others such as sending inappropriate emails or making inappropriate comments on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain Pornography

A

Hiding malware when someone downloads adult content which increases the risk of someone’s data being corrupted by a virus or stolen by an unauthorised data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Explain Data Theft

A

Theft of personal data which are then used to commit identity theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Denial of Service

A

A malicious attack on a network, eg preventing users from logging on to access their data or email accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Explain Digital Forgery

A

Intentionally and falsely altering digital content.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Explain Cyber Defamation

A

Using the internet to intentionally damage the reputation of a person or organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain Spamming

A

Spamming is sending junk emails as a result the inbox becomes overloaded and time is wasted opening and reading such emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain Phishing

A

Sending emails that appear to be from a reliable source asking recipients to update their personal information which is then used by hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Explain Malware

A

Malware is a malicious software that is downloaded onto a computer unintentionally by using the internet or from email attachments, or even by connecting a portable storage device such as a USB storage device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain Virus

A

Virus is designed to deliberately damage or make a computer system unreliable by slowing down the processor

A virus can store itself automatically on a computer hard drive as a hidden file but can be activated when certain program is opened or when a predetermined condition is met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Explain Trojan Horse

A

Trojan horse gains entry to a user’s computer in disguise.

The user is tricked into thinking that it is a useful piece of software and then downloading and opening the trogin

This can do serious damage: deleting files or continuously change desktop layout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Main Purpose of Trojan Horses

A

Deleting Data Files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain Worms

A

Worms are designed to spread from computer around a network without the need to be attached to any documents or programs

A worm spreads itself around a computer system by replicating itself

It could copy itself into every contact in an email address book and then travel to each recipient when an email is sent

it can then repeat this process for the recipient

it can cause problems on a network as the worm requires bandwidth which results in slower data transmission speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Explain Keylogger

A

A piece of software designed to record a user’s keystrokes

The user is unaware that this is happening

The Key Strokes are saved as a log file and then sent to the person who created the software at a later stage.

key loggers can be used to steal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Main Purpose of Keyloggers

A

Steal Banking Information

18
Q

Explain Spyware

A

Malicious Software which is secretly installed on a user’s Computer.

an internet information about Connection to collect information about activity Such as the websites they visit.

19
Q

What does Spyware do?

A

Tracks user’s activity such as credit card information and password details.

In some cases user information is Collected and then sold on to third party advertisers to allow them to market products to a number of users.

20
Q

What are some signs of spyware on your computer

A

Uses Valuable Computer memory which can Cause applications to crash due to lack of memory available.

21
Q

Explain Data Encryption

A

Encryption uses special to encode or ‘scramble’ data before it is transmitted to make data unreadable or meaningless if intercepted.

Only a user with the encryption key Software can unscramble the data when it arrives. at its destination۰

22
Q

What does Data Encryption do?

A

This makes the data unreadable or meaningless if intercepted
Users with the encryption key software can unscramble the data when it arrives at its destination

23
Q

Explain Usernames and Password

A

users on a network are allocated a unique user ID and a randomly generated passwords
Each time a user logs on the system checks their user ID and password to grant the user access to data

24
Q

How to make a password secure?

A

It should have unique login Credential

Passwords should be strong enough character. long, mix of letters. at least one upper case and digits and incluse. Character

Password Should be regularly changed.

Password Should appear as a asterisk (*) So others

users cannot see the password

25
Q

Why should a user have a strong password

A

To help reduce data theft

26
Q

Explain what a network manager has control over?

A

Who has been on the network
Location of the Computer

27
Q

Explain Access Levels

A

Users are allocated different levels of access to files
Types of Access:
Read Only
Read and Copy
Read and Write

28
Q

What happens if user doesn’t have the correct level of access?

A

They will be denied access

29
Q

What is a backup?

A

A backup is a copy of an original file just in case it is deleted accidently or corrupted

30
Q

Explain Backup

A

If data is lost or damaged, the network should have a method of recovering the data
Network backups are scheduled to run at certain times, example end of each day

31
Q

Explain Firewalls

A

Firewalls monitor and filter data entering or leaving a network

Blocks data which do not obey the organisation rules

32
Q

Expand FTP

A

File Transfer Protocol

33
Q

Explain FTP

A

File Transfer Protocol allows uses to download or upload files over internet
Encryption is Used for Safety

34
Q

What is a Protocol?

A

A set of rules to allow for communication between two different computer systems

35
Q

Expand HTTP

A

Hypertext Transfer Protocol

36
Q

Explain HTTP

A

Hypertext Transfer protocol is used by www to transfer webpages over the internet

37
Q

What will the HTTP report if webpage isn’t found?

A

Error 404 not found
is displayed

38
Q

Expand HTTPS

A

Hypertext Transfer Protocol Secure

39
Q

What is the main use of HTTPS

A

Financial transactions

40
Q

Explain HTTPS

A

Hypertext Transfer Protocol Secure uses SSL to ensure data is transmitted securely over the internet
Uses Encryption for sending data
Uses Decryption for receiving data

41
Q

What do worms do?

A

Slow data transmission speeds

42
Q

What does a virus protection software do?

A

Virus protection software can be installed on computers to prevent potential attacks regular scans but would need to be updated daily to take account of new viruses.