Social Implications Of Computer Networks Flashcards

(17 cards)

1
Q

How does authentication work

A

Authentication works by taking a unique identifier (such as a username or user ID) and matching it against the credentials stored on a database (such as a password).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an acceptable use policy

A

A contract between the user and the organisation that outlines what the user can and
cannot do on a particular network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the main concerns with BYOD policies in the workplace

A

How to keep the company’s private data separate from a user’s personal data and how to make sure that an employee does not accidentally share that private data.

One way to avoid this is to set up a data loss prevention policy using data loss prevention tools or use mobile device management software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can companies avoid security and usage issues in a BYOD environment

A

Companies must set up clear acceptable use policies for their staff.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name three types of institutions that would benefit from AUP’s

A

Universities
Orphanages
Charity organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Three advantages of cryptocurrencies over normal currencies

A

It is not backed by a single country’s central authority (its global).

Its value is not tied to anything physical (its decentralised).

It can be converted to a normal currency.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the term Big data mean

A

Big data is a term that describes the massive amounts of data that are generated every day by every
single person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Distinguish between normal currency and cryptocurrency

A

Normal currency (also called fiat currency) is physical or digital money issued by a country’s government or central bank, like the South African rand. It is usually backed by the government and can be used to buy goods and services in the real world.

Cryptocurrency is a completely digital form of money that exists online. It uses cryptography to secure transactions and is not controlled by any government or central bank. Instead, it relies on technology like blockchain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is unotharised access on a network

A

Is when someone gains access to a network using someone else’s credentials or through other illegal methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Guidelines that should be in AUPs

A

Clear descriptions of what will happen to a user who breaks the rules outlined in the AUP

When and how portable storage devices can be used

Restrictions on what software can be installed on the school’s computing devices

Guidelines on respecting copyright, intellectual property laws and privacy, as well as how to avoid plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Things to keep in mind when choosing a password

A

Make sure your password is at least 10 characters long or use a passphrase that is at least 15 characters long

Your password should not be something easy to guess such as “password” or “12345”

Make sure that your passwords are a mix of uppercase and lowercase letters, numbers and special characters

Make sure your passwoeee do not follow a pattern on the keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Tips to keep in mind when using a network

A

Make sure that your devices have up-to-date antivirus software installed and that you never click on suspicious links or reply with personal information to suspicious emails

Respect others’s privacy and products. Do not download or share content that has been obtained illegally or content that violates someone else’s copyright

Be careful with what you share about yourself on the internet

Follow the AUPs of any network you are using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the foundation of database security

A

Confidentiality (C) - people should be able to trust that any information about them that is stored is safe and secure. Databases need to be encrypted to make sure that this is the case

Integrity (I) - it means that the data can only be accessed by people who have the correct permissions to view it

Availability(A) - means that databases should be up and running when users need to access them. This means that any downtime should be scheduled and if there is unexpected downtown, database administrators should check that this is not due to a security breach

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How has capturing Big Data raised concerns about privacy?

A

It involves collecting large amounts of personal information, often without people knowing, which can be misused or leaked if not protected properly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What to do when someone hacks your account

A
  1. Change your password immediately
  2. Turn on two-factor authentication
  3. Report the hack and review your account for suspicious activity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is cryptography in the context of cryptocurrency?

A

Cryptography is the process of transforming personal and transaction data into unreadable code that can only be deciphered with the correct key. It keeps cryptocurrency transactions secure and private.

17
Q

Other concerns related to BED policies in companies

A

Most mobile devices might not have anti-virus software installed or if there is anti-virus software it is not up to date. This becomes and issue when users mistakenly download applications that contain malware, adware it spyware. When these infected devices connect to the network they can spread the infection, making th network unsecured

Employers cannot control what employees install on their devices. Employees may be able to install games or other media that can become a distraction