8. Security and ethics Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is hacking?

A

The act of gaining illegal access to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are viruses?

A

Program or program code that can replicate itself with the intention of deleting or corrupting files or cause the computer to malfunction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is phishing?

A

The creator sends out a legitimate looking email in order to obtain confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is pharming?

A

Code installed on the user’s hardware or on the web server that redirects the user to a fake website without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is wardriving?

A

Act of locating and using wireless internet connections illegally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware/key-logging software?

A

Software that gathers information by monitoring key presses on the user’s keyboard; the information is then sent back to the person who sent the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the possible effects of hacking?

A

Identity theft

Data can be deleted, changed or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the possible effects of viruses?

A

Can cause the computer to crash, stop functioning normally or become unresponsive
Data can be deleted, changed or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the possible effects of phishing?

A

Sender can gain info such as bank account numbers
Identity theft
Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the possible effects of pharming?

A

Can gain info such as bank account numbers
Identity theft
Fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the possible effects of wardriving?

A

Possible to steal a user’s internet time to download large files
Can steal a user’s password and personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the possible effects of spyware?

A

Can gain info such as bank account numbers

Able to install other spyware, read cookie data and change default web browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What methods can be used to prevent hacking?

A

Firewalls
Strong passwords and user ids
Anti-hacking software
(Encryption wont stop hacking but will make the data useless to the hacker)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What methods can be used to prevent viruses?

A

Anti-virus software
Not using software from unknown sources
Being careful when opening email attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What methods can be used to prevent phishing?

A

ISPs often filter out phishing emails

Being careful when opening email attachments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What methods can be used to prevent pharming?

A

Anti-spyware software

Be alert and look for clues that the website is not legitimate e.g. https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What methods can be used to prevent wardriving?

A

Use wired equivalent privacy (WEP) encryption
Use strong passwords
Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What methods can be used to prevent spyware?

A

Anti-spyware software

Use a mouse to select keys for passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are cookies?

A

Packets of data that collect information about the user’s habits.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why are cookies used?

A

So that companies can display adverts that may be of interest to the user.

21
Q

How can you prevent accidental loss of data?

A

Backups
Save data regularly
Use passwords to restrict access to authorised users only

22
Q

How can you prevent data loss through hardware fault (such as head crash on HDD)

A

Backups
Save data regularly
Use uninterruptable power supply

23
Q

How can you prevent data loss through software fault?

A

Backups

Save data regularly

24
Q

How can you prevent data loss due to incorrect computer operation?

A

Backups

Good training procedures

25
Q

What does a firewall do?

A

Check whether data meets a set of criteria and if doesn’t block the traffic and give the user a notification
Logging all traffic to allow later interrogation
Keep a list of undesirable IP addresses created by the user
Helping prevent viruses and hacking

26
Q

What does a proxy server do?

A

Acts as a firewall
Keeps IP address secret
Uses a cache so that the user can connect to a website faster

27
Q

How does SSL work?

A

The web browser sends a message to the server requesting that it identifies itself
The server responds by sending a copy of its SSL certificate
If the web browser can authenticate the certificate it sends a message to the server to allow communication to begin
One this message is received the server acknowledges the browser and the data transfer can begin

28
Q

What is the purpose of TLS?

A

Provides encryption and authentication to prevent hacking.

29
Q

What are the two layers of TLS?

A

Record protocol - contains the data being transferred over the internet
Handshake protocol - allows the website and the user to authenticate each other and use encryption algorithms

30
Q

What are the differences between TLS and SSL?

A

Possible to extend TLS by adding new authentication methods
TLS makes use of session chaching
TLS separates the handshaking process from the record layer

31
Q

What is the advantage of using session caching?

A

Opening a TLS session requires a lot of computer time but caching allows the user to start or resume a session which is faster.

32
Q

What is symmetric encryption?

A

Uses 2 secret keys, 1 to encrypt and 1 to decrypt

33
Q

What is a problem with symmetric encyption?

A

Key distribution problem - keys could be interpreted by a user

34
Q

How can the key distribution problem be solved using symmetric encryption?

A

Algorithms which create a key using random numbers chosen by the sender and receiver

35
Q

How does asymmetric encryption work?

A

User A applies a symmetric key
The symmetric key is encrypted using the public key
User a sends the message with the encrypted key
User B decrypts the symmetric key by applying their private key
The symmetric key is used to decrypt the message sent by A

36
Q

How can the user increase the security of encryption?

A

Increase the length of the key - lots more possible keys

37
Q

What is authentication?

A

Used to verify that data comes from a trusted source

38
Q

Examples of authentication

A

Passwords, digital signatures, biometrics

39
Q

How do digital signatures work?

A

User writes a message
Message put through hashing algorithm
The hash number is encrypted using a private key
The message and hash number are sent over the internet
The hash number is decrypted using a public key
The hash number is compared with the message to see if the message has been altered

40
Q

Types of biometric

A

Fingerprint scans, retina scans, face recognition, voice recognition

41
Q

What is a denial of service attack?

A

An attempt to prevent users from accessing part of a network by repeatedly bombarding the server with requests

42
Q

What effects can a DOS attack have?

A

Prevent a user from accessing emails, websites or online services

43
Q

How can a user guard against DOS attacks?

A

Use up to to data malware checking software
Use a firewall
Apply email filters

44
Q

Signs a DOS is happening

A

Slow network performance
Unavailability of a website
Large amounts of spam email

45
Q

Ways a bank protects customers’ information

A
10-12 digit code
Input random numbers from pin/password
Card reader - generates a code from an internal clock and the PIN
Insert password using drop down boxes
Ask for personal data
46
Q

What is free software?

A

Users can copy, change or adapt it.

47
Q

What is freeware?

A

Software a user can download for free without further charges but they cannot study or modify the source code.

48
Q

What is shareware?

A

A free trial of a software which, after a period of time, the user will be asked to pay for.

49
Q

What can a user do with free software?

A

Run it for any legal purpose
Study the source code and modify it to meet their needs
Pass the software in original or modified form to other people