Dark Side Of Computing Flashcards
(21 cards)
What can bad programming lead to?
Bugs, security vulnerabilities, and incorrect data
Bad programming can be full of logic errors and may lack data validation techniques.
What are the consequences of poor training for users?
Users make mistakes and lose trust in the system
Poor training can lead to user errors that undermine system reliability.
What can result from a breakdown in user trust?
Decreased efficiency, reduced morale, increased workload, incorrect/delayed decision making
Frequent system failures can lead to users putting off work, creating workarounds, and making poor decisions.
How can information inaccuracy affect product quality?
Decreased product quality
This includes physical products and intangible information.
What are some methods for data protection?
Control access to physical data, limit use of portable storage, control access to computers
This includes locking rooms, password protection, and monitoring internet usage.
What is social engineering?
Manipulating people to gain access to their secrets or data
It often relies on tricking individuals into revealing sensitive information.
What is a common phishing attack sequence?
Receive email, click link, enter credentials on fake site
The fake site mimics a legitimate organization to steal user information.
What are the signs of phishing emails?
Too good to be true offers, requests for personal information, urgency
Examples include fake lottery winnings or job offers requiring payment.
What is malware?
Malicious software designed to infect a computer and disrupt normal operations
It can steal data, install more malware, and monitor user activity.
How can computers be infected with malware?
Opening infected files, installing infected software, visiting infected websites
Other methods include drive-by downloads and exploiting software vulnerabilities.
What is a Trojan horse in cybersecurity?
Malware disguised as a normal file or program
It tricks users into opening it, allowing attackers access to the computer.
What does spyware do?
Tracks computer and online activities without the user’s knowledge
It sends this data back to the creator of the spyware.
What is the purpose of ransomware?
To encrypt files on a computer and demand a ransom for decryption
Paying the ransom does not guarantee file recovery.
What distinguishes a worm from a virus?
Worms self-replicate and spread independently
Unlike viruses, worms do not require user action to propagate.
What is a rootkit?
Malware that hides its presence and allows remote access to a computer
It is difficult to detect and often requires a complete system wipe to remove.
What is browser hijacking?
Changing a web browser’s settings without permission
It may redirect users to unwanted sites or display ads.
What is a Denial of Service (DoS) attack?
A cyber-attack that makes a network resource unavailable
It floods a target with requests to overload the system.
What is the definition of computer misuse?
Using computer resources without permission for unauthorized tasks
This includes hacking, piracy, and using work computers for personal tasks.
What are some social consequences of malware?
Financial costs, lost productivity, personal implications
This includes fraud, time wasted fixing infections, and decreased trust.
Fill in the blank: Malware that displays ads on your computer is called _______.
Adware
Adware often comes bundled with spyware.
True or False: All phishing emails are easy to identify.
False
Many phishing attempts are designed to look legitimate and can be very convincing.