Social Implications Of Computer Networks Flashcards
(17 cards)
How does authentication work
Authentication works by taking a unique identifier (such as a username or user ID) and matching it against the credentials stored on a database (such as a password).
What is an acceptable use policy
A contract between the user and the organisation that outlines what the user can and
cannot do on a particular network.
What are the main concerns with BYOD policies in the workplace
How to keep the company’s private data separate from a user’s personal data and how to make sure that an employee does not accidentally share that private data.
One way to avoid this is to set up a data loss prevention policy using data loss prevention tools or use mobile device management software
How can companies avoid security and usage issues in a BYOD environment
Companies must set up clear acceptable use policies for their staff.
Name three types of institutions that would benefit from AUP’s
Universities
Orphanages
Charity organisations
Three advantages of cryptocurrencies over normal currencies
It is not backed by a single country’s central authority (its global).
Its value is not tied to anything physical (its decentralised).
It can be converted to a normal currency.
What does the term Big data mean
Big data is a term that describes the massive amounts of data that are generated every day by every
single person.
Distinguish between normal currency and cryptocurrency
Normal currency (also called fiat currency) is physical or digital money issued by a country’s government or central bank, like the South African rand. It is usually backed by the government and can be used to buy goods and services in the real world.
Cryptocurrency is a completely digital form of money that exists online. It uses cryptography to secure transactions and is not controlled by any government or central bank. Instead, it relies on technology like blockchain.
What is unotharised access on a network
Is when someone gains access to a network using someone else’s credentials or through other illegal methods
Guidelines that should be in AUPs
Clear descriptions of what will happen to a user who breaks the rules outlined in the AUP
When and how portable storage devices can be used
Restrictions on what software can be installed on the school’s computing devices
Guidelines on respecting copyright, intellectual property laws and privacy, as well as how to avoid plagiarism
Things to keep in mind when choosing a password
Make sure your password is at least 10 characters long or use a passphrase that is at least 15 characters long
Your password should not be something easy to guess such as “password” or “12345”
Make sure that your passwords are a mix of uppercase and lowercase letters, numbers and special characters
Make sure your passwoeee do not follow a pattern on the keyboard
Tips to keep in mind when using a network
Make sure that your devices have up-to-date antivirus software installed and that you never click on suspicious links or reply with personal information to suspicious emails
Respect others’s privacy and products. Do not download or share content that has been obtained illegally or content that violates someone else’s copyright
Be careful with what you share about yourself on the internet
Follow the AUPs of any network you are using
What is the foundation of database security
Confidentiality (C) - people should be able to trust that any information about them that is stored is safe and secure. Databases need to be encrypted to make sure that this is the case
Integrity (I) - it means that the data can only be accessed by people who have the correct permissions to view it
Availability(A) - means that databases should be up and running when users need to access them. This means that any downtime should be scheduled and if there is unexpected downtown, database administrators should check that this is not due to a security breach
How has capturing Big Data raised concerns about privacy?
It involves collecting large amounts of personal information, often without people knowing, which can be misused or leaked if not protected properly
What to do when someone hacks your account
- Change your password immediately
- Turn on two-factor authentication
- Report the hack and review your account for suspicious activity
What is cryptography in the context of cryptocurrency?
Cryptography is the process of transforming personal and transaction data into unreadable code that can only be deciphered with the correct key. It keeps cryptocurrency transactions secure and private.
Other concerns related to BED policies in companies
Most mobile devices might not have anti-virus software installed or if there is anti-virus software it is not up to date. This becomes and issue when users mistakenly download applications that contain malware, adware it spyware. When these infected devices connect to the network they can spread the infection, making th network unsecured
Employers cannot control what employees install on their devices. Employees may be able to install games or other media that can become a distraction