Learning Aim E Flashcards

(18 cards)

1
Q

What is malware

A

Software created to steal data by gaining access to an IT system without user consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Router

A

An electronic device that enables transmission between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In Malware how does a viruses spread

A

Copies and inserts itself into programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In malware how do worms work

A

Like viruses but don’t attach itself to others programs and tunnels through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In malware how do trojans work

A

Makes itself looks legit thing the person wants but has a harmful payload, it doesn’t self-replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does spyware work in malware

A

it steals the users information such as what keys they press

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is brute force hacking

A

They guess your password but this encourages stronger passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can someone redeem a ‘bounty’ with hacking

A

When a hacker does it in attempt to find flaws in security systems so can report it back (not with malicious attempt)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Phishing

A

people send emails trying to look like a business and people will click a link to get access to personal information , Sent to thousands of people and would be sent at any times

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is meant by accidental damage

A

Human error and when we damage our IT system might mean we loss loads of data. Preventable if being careful not to drop your phone, put in contact with liquid or delete/ overwrite things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is one way of protecting your files

A

Ways of making it so that you can make it rad only and no other user can edit whats being said

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is access levels in ways of protection

A

Where you limit who access the files and only you or other trusted uses can get in

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are backing and recovering procedures

A

If anything is being damaged it is a way to try and make sure that files don’t get lost and can recover it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are passwords

A

Personalise thing that is linked to an account this is supposed to make keeping your account safe with only you knowing what it is.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What ways do companies say you should do to protect our data

A

using capitals letter and characters
pas$woRd912!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is physical access control

A

stop people getting to it physically. There is a place that uses a server room with the server might either have a key or lock so more secure and people cant get in.

17
Q

How does a normal anti virus work

A

scans malware and looks for a pattern. Similar to fingerprint to be compared to programs on hard disc to pick up virus