Unit 3 Operating Online Flashcards
What is unauthorized access?
access to networks by users who are not permitted to access them.
what is malware?
malicious software that is created with the intention to do harm.
What does ransomware threaten?
It threatens to delete a user’s files or places restrictions on a user’s access to software or resources until money is paid.
How does ransomware make users feel?
It can be distressing, as messages are written in a way that they must act quickly, putting pressure on the act.
How can accidental deletion happen?
-pressing a key on a keyboard by accident
-formatting media on the wrong storage device
-their device losing power unexpectedly
What is Phishing?
The criminal activity of sending emails or having a website that is intended to trick someone into giving away personal information, to get money or goods.
How can Phishing be sent?
Sent by text, or instant message apps.
What is Pharming?
it is a technique used by criminals to gain personal information etc by creating fake trusted websites.
users then enter their login details, which criminals can then use to access their accounts.
Describe the two main methods by which people are directed to a pharming site
- Internet traffic going to the real website is redirected to the fake website- they alter the domain name servers or malware.
- The URL is very similar to the real website.
How do firewalls secure data and personal information online?
Firewalls control the data travelling in and out of a network.
They examine the network address and compare those to a list of rules that are changed by administrators.
How does encryption secure data and personal information online?
Encryption uses a key to scramble data into an unreadable form, it is useless unless the interceptor can identify the key
How do passwords, pins and bio metrics secure data and personal information online?
They authenticate a user so that they can access an online system. Most pins and passwords are masked so that anyone watching the screen cannot see what is typed.
How do Captcha tests and security questions secure data and personal information online?
CAPTCHA tests are used to make sure that data is entered by a human and not by an automatic software program (bot)
e.g. they may ask users to enter a series of letters or numbers on the screen or find animals etc.
reCAPTCHA tests work with text extracts scanned from books or images with a common feature which the user must identify.
How does anti-malware secure data and personal information online?
Anti-malware prevents malware from accessing or operating on computers by scanning files in real time and allowing users to do the same.
Anti-virus
A virus is malware that uses networks to spread to connected devices. anti-virus software constantly checks files that are downloaded and looks for viruses.
It needs to be updated regularly because virus codes can be changed.
Anti-adware
adware displaces unwanted adverts to users, this software detects and removes adware
Anti-spyware
spyware secretly monitors and records computer data and user input. this software detects and removes spyware.
How do access rights and file permissions secure data and personal information online?
Permissions can be set for access to files, folders or drives or allowing users to read, write on files.
What is HTTP and what does it do?
How do secure websites secure data and personal information online?
HTTP (hypertext transfer protocol) is used to exchange data between a web server and a client. this is not secure so HTTPS is used (secure)
It authenticates payment servers and provides encryption using SSL.
Why can email attachments and web links be bad?
Users should always be careful when opening email attachments, some are fake and are designed to steal personal information, therefore should keep their anti-malware software up to date. for example if:
-they don’t know the sender
-the text is general and not specific
-text has spelling errors
-user does not recognise the URL
Backup procedures
backups create one or more copies of data which are usually stored on an external storage device or an online storage, however this can be slower as it needs a good internet connection.
users decide how many files to back up and how often they should back them up.
loss of files can be caused by:
-theft
-flooding or fire
-malware
-power cuts
Online payment systems
these systems send payment details across networks to computers that process the payments.
Online third-party payment processors
e.g. Paypal
they allow users to create an account so that they can send and receive money using email accounts for identification. they can also use systems that link with online shopping apps, making it faster and easier.
What do bankcards allow customers to do?
They allow customers to pay for goods and services online and in shops
When paying online what do you have to enter?
-card number
-expiry date
-name
-CSC (card security code)
what is NFC?
Near field communication
Explain how NFC works.
this payment does not require a PIN or any authentication, if a card reader is in range, the contactless card with pay up to a maximum amount.
Impact of the internet - employment
Skill requirements
many employers now require employees to use the internet for work, therefore they have to learn new skills.
Similarly modern teachers must understand the internet to teach their students about the risks that they could face in the online world.
New Job opportunities as the nature of jobs changes
People are changing with the internet for work, skilled workers are now needed to support the development of using the internet.
They are required to train unskilled workers and create software that workers can use.
These need to be installed and maintained.
Job losses
If employees don’t update their skills in the use of the internet, they may not have the skills required to carry out new work and could lose their jobs.
Impact of the internet - working practices
working practices are the ways in which people carry out the tasks that are part of their jobs
What is collaborative working?
People can connect with each other in real-time and share work.
This is more efficient as work can be split into a number of individual tasks, each can be done by a different employee.
Benefits of collaborative working
-each employee can focus on one task
-employees become experts in their area
-expertise is shared
-employees can check each other’s work
Drawbacks of collaborative working
-employees do not share their skills and expertise
-they may have reduced understanding of the whole project
-it can for difficult for everyone to agree
-it can be difficult to co-ordinate the work of many employees.
What is flexible working?
It is a way of working that suits an employee’s needs.
Benefits of flexible working
-employees can work at a time of day that suits them
-employees can fit work around family time
-employees can access up-to-date information
-they can work from anywhere with an internet connection
Drawbacks of flexible working
-employees do not meet face to face- reduce their understanding
-employees may not be able to manage their work effectively
people who move:
-employees could be exhausted if they work longer than expected when travelling
-they may not have access to the same facilities or resources then people who work in one place
What is the social impact on people?
-the internet having a huge impact on the way in which people socialise particularly due to the rise of social media sites
what is social interaction?
communication with and reaction to others
-humans require interaction as it makes them feel connected with each other from around the globe
How is the internet changing how we socialise in person?
-virtual environments is replacing face-to-face social interaction
-it is damaging people’s ability to talk to each other and understand emotions
Why is having access to the a wider community on the internet good?
-makes people more aware of other cultures and societies which broadens their view of the world
what are social network applications?
software that allows social interaction and the creation of links between users based on shared characteristics and interests.
what is cyber bullying?
-using the internet to send text, images or multimedia in order to upset or embarrass someone.
-it can be more distressing than offline bullying as they are isolated and unidentifiable.
give one reason why cyberbullying is more damaging than in person bullying?
-information can spread very quickly and to more people- larger audience
To stay safe online what three rules should be followed?
-zip it
-block it
-flag it
Explain why zip it is important?
-keep your personal information private and don’t share it
don’t share your:
-location
-phone number
-real name
-photos
you can use privacy settings to prevent this
Explain why blocking it is important?
always block offensive messages or friend requests from strangers
-don’t open weird attachments or links and use safe search filters
Explain why flagging it is important?
you should always tell an adult if something upsets you online.
-users can report grooming behaviour to national crime agencies
What is The Virtual Global Task force?
-it is an international organisation that tries to protect young people online
-it is a report abuse button that can be found on many social media sites
what is a digital footprint?
all the data that a user creates online, which is recorded and stored- the impression that you leave online
What questions should you ask before sharing content online?
-would i show this to my parents or grandparents?
-could people every misinterpret this?
How can you minimise your digital footprint?
-closing old social media accounts
-searching your own name online
-asking website owners to remove old content of you
Benefits to individuals of working from home.
No need to travel to work:
-reduces stress caused by traffic
-saves money
-makes people feel as though they are
helping the environment.
Can spend time working or resting
No need to wear a uniform- reduces cost
Can work at a time that suits them
Can work in a comfortable environment
Drawbacks to individuals of working from home.
-may be distractions at home
-suffer from a lack of social interaction with colleagues
-feel disconnected form the company
Benefits to organisations of working from home.
-can attract a talented workforce
-can employ people who are located anywhere
-do not need to buy or rent office space or furniture
-workers may work more effectively at home
Drawbacks to organisations of working from home.
-may be concerns about data security
-may be more difficult to manage and support employees who are not in the office
-can be complicated to organise payments and permissions
what are positive impacts of the internet on organisations?
-improved communication
-access to global markets
-access to global workforce
How does improved communication help organisations?
-they can communicate and interact with their customers and employees
-they can publish live information online, allowing people to follow their activities.
-they can provide up-to-date information about the development, pricing and availability of products and services.
How does access to global markets help organisations?
-they can advertise and sell to customers globally
-digital content producers can sell their products online- avoiding high postal charges
-manufacturers can access businesses easier and communicate faster.
How does access to global workforce help organisations?
-organisations can employ people in other countries
-they can be more selective when hiring employees
-they can use people from different time zones and with diff skills
How does information being managed and used help an organisation?
-they can make use of big data to understand the behaviour of their customers by improving the customer experience and making their processes more efficient.
What are two negative impacts of organisations using the internet?
-security issues
-greater competition
How do security issues negatively impact organisations?
-the data stored is private and valuable
-it can be physically secured by walls, locks alarms or guards
organisations use 3 methods to provide their employees with access to systems:
-allowing employees to transfer a copy of their data to home email
-providing remote access to data stored in their building
-stores data on other servers, providing access to that data
How can unauthorised users gain access to systems?
-authorised users reveal their login details
-organisations have policies to make employees accountable for their actions.
-they intercept the data as it is transferred from computers.- they can use encryption to secure data when transferring it
-they can hack into their system- organisations can prevent this by using authentication, firewalls and intrusive detection systems.