Learning Aim E Flashcards
(18 cards)
What is malware
Software created to steal data by gaining access to an IT system without user consent
What is a Router
An electronic device that enables transmission between devices
In Malware how does a viruses spread
Copies and inserts itself into programs
In malware how do worms work
Like viruses but don’t attach itself to others programs and tunnels through the network
In malware how do trojans work
Makes itself looks legit thing the person wants but has a harmful payload, it doesn’t self-replicate
How does spyware work in malware
it steals the users information such as what keys they press
What is brute force hacking
They guess your password but this encourages stronger passwords
How can someone redeem a ‘bounty’ with hacking
When a hacker does it in attempt to find flaws in security systems so can report it back (not with malicious attempt)
What is Phishing
people send emails trying to look like a business and people will click a link to get access to personal information , Sent to thousands of people and would be sent at any times
What is meant by accidental damage
Human error and when we damage our IT system might mean we loss loads of data. Preventable if being careful not to drop your phone, put in contact with liquid or delete/ overwrite things
What is one way of protecting your files
Ways of making it so that you can make it rad only and no other user can edit whats being said
What is access levels in ways of protection
Where you limit who access the files and only you or other trusted uses can get in
What are backing and recovering procedures
If anything is being damaged it is a way to try and make sure that files don’t get lost and can recover it
What are passwords
Personalise thing that is linked to an account this is supposed to make keeping your account safe with only you knowing what it is.
What ways do companies say you should do to protect our data
using capitals letter and characters
pas$woRd912!
What is physical access control
stop people getting to it physically. There is a place that uses a server room with the server might either have a key or lock so more secure and people cant get in.
How does a normal anti virus work
scans malware and looks for a pattern. Similar to fingerprint to be compared to programs on hard disc to pick up virus