8. Security and ethics Flashcards
What is hacking?
The act of gaining illegal access to a computer
What are viruses?
Program or program code that can replicate itself with the intention of deleting or corrupting files or cause the computer to malfunction.
What is phishing?
The creator sends out a legitimate looking email in order to obtain confidential information.
What is pharming?
Code installed on the user’s hardware or on the web server that redirects the user to a fake website without their knowledge.
What is wardriving?
Act of locating and using wireless internet connections illegally.
What is spyware/key-logging software?
Software that gathers information by monitoring key presses on the user’s keyboard; the information is then sent back to the person who sent the software
What are the possible effects of hacking?
Identity theft
Data can be deleted, changed or corrupted
What are the possible effects of viruses?
Can cause the computer to crash, stop functioning normally or become unresponsive
Data can be deleted, changed or corrupted
What are the possible effects of phishing?
Sender can gain info such as bank account numbers
Identity theft
Fraud
What are the possible effects of pharming?
Can gain info such as bank account numbers
Identity theft
Fraud
What are the possible effects of wardriving?
Possible to steal a user’s internet time to download large files
Can steal a user’s password and personal information
What are the possible effects of spyware?
Can gain info such as bank account numbers
Able to install other spyware, read cookie data and change default web browser
What methods can be used to prevent hacking?
Firewalls
Strong passwords and user ids
Anti-hacking software
(Encryption wont stop hacking but will make the data useless to the hacker)
What methods can be used to prevent viruses?
Anti-virus software
Not using software from unknown sources
Being careful when opening email attachments
What methods can be used to prevent phishing?
ISPs often filter out phishing emails
Being careful when opening email attachments
What methods can be used to prevent pharming?
Anti-spyware software
Be alert and look for clues that the website is not legitimate e.g. https
What methods can be used to prevent wardriving?
Use wired equivalent privacy (WEP) encryption
Use strong passwords
Firewalls
What methods can be used to prevent spyware?
Anti-spyware software
Use a mouse to select keys for passwords
What are cookies?
Packets of data that collect information about the user’s habits.