AQA A-Level Computing 6.4 Internet Security Flashcards
Virus
A small program attatched to another program or data file. It replicates itself by attaching itself to other programs. It usually attacks the computer.
Spam
Unsolicited junk e-mails.
Worm
A small program that exploits a network security weakness (security hole) to replicate itself through computer networks. It may attack computers.
Remote login
When someone connects to a computer via the internet.
Trojan
A program that hides in or masquerades as desirable software, such as a utility or a game, but attacks the computers it infects.
Phishing
When someone tries to get you to give them your personal information
Pharming
When a phisher changes DNS server information so that customers are directed to another site.
Encryption
Using an algorithm and a key to convert message data into a form that is not understandable without the key to decrypt the text.
Plain text
Message data before it is encrypted
Cipher text
message data after it has been encrypted
Decryption
Using an algorithm and a key to convert encypted message data into its plain text equivalent
Cryptography
The science of designing cipher systems
Cryptanalysis
Trying to find the plain text from the cipher text without the decryption key
Break the code
Find the plain text from the cipher text by guessing or deducing the key