Security Flashcards

1
Q

Define hacking

A

Hacking is the act of illegally gaining access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

effects/functions of hacking

A

Identity theft/fraud

Data could be deleted, changed or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ways to prevent hacking

A

Install firewalls
Very strong passwords
Antihacking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define spyware

A

Spyware is software that gathers information by monitoring key presses on keyboard. Information is sent back to person who coded the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

effects / functions of spyware

A

Gives originator access to all data entered using keyboard

Able to install other spyware, read cookie data and change users default browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Solutions to spyware

A

Anti-spyware software

Using a mouse to select characters for passwords (dropdown box etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define viruses

A

Viruses are programs that replicate themselves with intentions of causing files/computers to be deleted/corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Functions/effects of viruses

A

Cause computer to crash/stop functioning
Can delete files/data
Can corrupt files/data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Solutions to viruses

A

Install anti-virus software

User should be carful when downloading files online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define pharming

A

Pharming occurs when a malicious code is installed on a user’s hard drive/webserver. This code redirects user to fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

functions/effects of pharming

A

Access to personal data

Identity theft/ fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Solutions to pharming

A

Anti-spyware
Look out for https
dont open suspicious things
look out for signs of redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define phishing

A

This is when a user receives a legit looking email with a link redirecting them to a bogus website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

functions/effects of phishing

A

Can gain personal data with website

Identity theft/fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solutions to phishing

A

User should be cautious

Way to filter out emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define wardriving

A

Act of locating and using wireless internet connections illegally

17
Q

functions/effects of wardriving

A

Possible to steal a user’s internet time

Possible to hack into wireless network and steal users passwords

18
Q

Solution to wardriving

A

Use of firewalls

Complex passwords

19
Q

What is a cookie

A

A cookie is a packet of data sent by a web server to a web browser. They are generated each time the user visits the website

20
Q

Some uses of cookies

A

Tracks customer preferences
Keeps cart for customer in online shopping sites
Tracks first time users and customers
Tracks wishlist

21
Q

What are the threats to data

A
Accidental damage( human error, power outage, accidentally deleting file)
Natural disasters (flood/fires/hurricanes)
Malicious actions (deliberate unauthorized actions
Data corruption( errors that occur during processing changing it)
22
Q

Solutions to threats to data

A

Saving regularly
Use of backups
Password protecting individual files
Training to avoid accidents

23
Q

What are firewalls

A

Firewalls are security systems designed to prevent unauthorized access to and from computer or private network

24
Q

Describe operation of firewall

A

It monitors ingoing and outgoing traffic
Firewall software contains dictionary of code from malwares
Firewall sits between computer and network
It analyses data and compares its code with set criteria
If it meets certain criteria it is allowed to enter
If it doesn not/ matches andy o the malware
It blocks or deletes it
Keeps a log of all the data that passes trough it/interacts with it

25
Describe operation of proxy server
Acts as an intermediary between user and web browser Using cache, speeds up access to website by storing pages at 1st visit Acts similarly to firewall Monitors ingoing and outgoing traffic Can block requests from IP addresses
26
Describe operation of DoS
``` It is designed to prevent users access to a website Numerous requests sent to webs server At the same time Web server becomes flooded with traffic Webserver cannot take it Webserver crashes Website cannot be accesses ```
27
Ways to guard against DoS attacks
Anti-malware, anti-virus Setting up a firewall Applying email filters