Security Flashcards
Computer security
The protection of computers form unauthorised access and the protection from data loss.
How to prevent unintentional loss of data
- Backup of data help to retrieve data when it is lost
- Verification helps to prevent data loss occurring
Backups
Is a copy of data being used that we can keep in case of data loss. The data is copied on separate storage medium.
Where to back up data?
- magnetic media-external hard disk drive or magnetic tapes
- optical media-CD, DVD, Blue-ray disks
- cloud storage-online back up facilities
Verification
Is a check that asks the user to confirm whether or not he wishes to go ahead with the instruction.
When the verification is used?
- when attempting to save a file with a filename that already exists in that location
- when deleting a record or file
Types of attacks
- malware
- phishing
- pharming
- denial of device (DoS) attack
Types of malware
- viruses
- worms
- trojan horses
- spyware
Worms
They replicate themselves over and over, filling the computer’s storage. This can cause a computer to run slowly or stop running.
Trojan
Programs that disguise themselves as other programs. When run, they act like any other virus, deleting and corrupting files.
Phishing
Attack usually comes in the form of email. The email will look person or organisation that is known and trusted by the user. It is designed to trick user into giving data such as passwords.
Pharming
Attempts to trick the user into giving their personal data by using fake websites. When a user tries to visit a genuine website, they instead re-direct to a fake website that looks almost same.
How does pharming work?
Malware installed on the user’s computer look for domain names of reputable sites and translates them into different IP addresses those of fake websites.
DoS attacks
Denial of Service. These attacks are not designed to gain access to data but instead they prevent access to data.
How does DoS attack work?
It attempts to prevent access to a server by sending it more requests than it can handle. The request queue becomes so large that the server cannot respond to all requests within a reasonable time.