Chap 5.3 - The internet & its uses (solutions to cyber security threats) Flashcards
Access control and levels
-hierarchy of different access levels through password to prevent unauthorised access
-important in organisation- keep data relevant to worker
-social networks in privacy settings- public access, friends, customs, data owner
anti malware function
detect and remove malware
anti virus function
-full system checks once a week and updates
-compare virus against signature files ( database of known viruses)
-do heuristics checking - check behaviors for possible viruses
-possible infected file are quarantined- automatically deleted, or asks user’s permission - maybe a false positive
anti spyware function
-detect, remove and prevent installation of illegal spyware softwares
-encrypts file and keyboard strokes
-scans and warns uses of stolen information
-identifies spyware through file structure or typical features related to spyware
authentication and how it works
-process of confirming user’s identity before allowing access
-user need to have something have, know, unique to them
ways passwords are kept safe for authentification
-change frequently
-run anti- spyware
-shown as * on screen for privacy
-finite amount of tries
-has to match with user name
2 step verification
-authentication that requires 2 methods of verification to prove user’s identity
-user has to enter username and password
-8 digit pin is sent to user via email/ phone no. which they can enter to get access
biometrics and how it is done
-using physical charastics for access
-fingerprint scans
-retina scans
-face recognition
-voice recognition
how does fingerprint scans work, good and bad
-image is compared to image stored in database
-1 in 5000 accuracy
good - person always has them, difficult to replicate, unique to each person, easy to use, small storage requirement
bad - mistakes if skin is dirty, damaged fingerprints
how does retina scans work, good and bad
-use infrared light to scan blood vessels in the eyes
-person has to be still for 10 - 15 s
-1 in 10 000 000 accuracy
good - high accuracy, cannot replicate blood vessels
bad - intrusive, expensive installation, long time to verify
how does face recognition scans work, good and bad
good- non- intrusive, inexpensive
bad - affected by lighting, hair , age changes, glasses
how does voice recognition scans work, good and bad
- good - non- intrusive, short to verify, inexpensive
- bad - voice can be recorded and used, low accuracy, illnesses affecting voice
automatic software updates
-softwares on device are updated
-done overnight or when device is off
-may contain patches
what do patches do
update software security/ improve performance
bad of automatic software updates
-disrupts device after installation, losing existing data
what to do when checking spelling and tone
check;
-spelling and grammar
-tone and language
-URL links
-for secure protocol
privacy settings
-controls on website or network that limits data access to public
-stops websites from collecting and using browsing data
-check to see payments method have been saved
-gives alert when browser is in a dangerous website
-web browsers have privacy options
Secure Socket Layer (SSL)
-security protocol that encrypts data between user and server
-SSL certificates used to authenticate websites
-establishes a secure & encrypted link between the server & the user
eg. online banking, online shopping, receiving emails
Firewalls
-software or hardware and protects system by filtering traffic
-between user’s computer and internet
-blocks internet if user’s criteria is not met
-prevents hacking, malware, phishing, pharming
-can’t prevent user’s in internal network to bypass firewall or diasble firewall
proxy servers
-provides a layer of security between user and internet
-filters and blocks traffic
-keeps user’s IP private
-prevents direct access to server
-is hit first when an attack is launched on computer
-faster access to website data using proxy server cache
-act as firewalls
3 differences between proxy server and firewall
- proxy hides user’s Ip, not firewall
2.Proxy protects server, firewall protects user’s computer
3.proxy allows faster access to web page, not firewall
2 similarities between proxy server and firewall
-both can be either hardware or software
-both block unauthorised access