Chapter 7 (abigail) Flashcards

1
Q

What is cybercrime?

A

Cybercrime is defined as using a computer to commit a crime. People involved in cyber crime are regarded as cyber criminals. Apart from planting viruses, cyber crime also incudes theft of personal information, stealing money from credit cards & theft of company data that could be sold to competitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe hacking as a threat to cyber security:

A

A hacker is a person who gains unauthorised access to a computer with the intention of corrupting data stored on a hard drive/file server or to steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe pornography as a threat to cyber security:

A

Pornography is often used as a means of hiding malware. When an employee downloads adult content they are increasing the risk of organisation data being corrupted by a virus or stolen by an unauthorised user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe cyber stalking as a threat to cyber security:

A

Where individuals se technology to harass others, eg by sending inappropriate emails or making inappropriate comments on social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe data theft as a threat to cyber security:

A

The theft of customer records to obtain personal details which are then used o commit identity fraud such as credit card or passport applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe denial of service as a threat to cyber security:

A

A malicious attack on a network, eg disrupting connections to a web sever preventing users from logging on to access their data or email accounts because access to the internet is denied.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe digital forgery as a threat to cyber security:

A

Intentionally and false letting digital content, eg pictures and documents. For example changing a passport photograph and/or names to sell on to a criminal who wishes to enter a country.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe cyber defamation as a threat to cyber security:

A

Using the internet with the intention to damage the reputation if a person or organisation by posting slanderous messages using mediums like electronic forums or bulletin boards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe spamming as a threat to cyber security:

A

Sending bulk junk emails such as adverts for products. Consequently, the users email inbox becomes overloaded, as the spam emails take up a large portion of the bandwidth. Time is also wasted opening & reading such emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe phishing as a threat to cyber security:

A

Sending emails that appear to be from a reliable source. These emails often ask the user to update their personal information by clicking a hyperlink to a webpage. This information will hence be used by hackers for the purpose of identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is malware?

A

Malicious software that is downloaded onto a computer unintentionally via the internet, email attachments or even by connecting a portable storage device eg a USB . Malware can be annoying & can also threaten the computer’s security. Computer systems are under constant threat from malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 5 types of malware:

A

Viruses, Trojan Horses, Worm, Key Logger, Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe viruses:

A

-Can enter through the network by browsing the internet, opening email attachment nets, via a USB storage device, etc.
-Can store itself automatically on a computer hard drive as a hidden file.
-Can be activated when a certain program is opened or a predetermined condition is met, eg a certain date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Trojan horses:

A

-Gains entry to a user’s computer ‘in disguise’
-Tricks the user by encouraging them to open& download a software program that they require.
-Once installed, some Trojans and do serious damage eg deleting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe worms:

A

-Spreads around a computer system by replicating itself.
-Spreads around a network without the need to be attached to any document or program.
-Requires bandwidth, which could result in slower data transmission speeds.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe a key logger:

A

-A program that is designed to record keyboard activities performed by users (keystrokes).
-These are saved as a log file & sent to the person who created the program.
-Main purpose is to steal personal information from users (eg bank details).

17
Q

Describe spyware:

A

-Software that is secretly installed in a user’s computer from the internet.
-Trolls user activities, gathering useful information like credit car & password details used on net sites.

18
Q

Describe data encryption:

A

-Encryption uses special software to encode or ‘scramble’ data before it’s transmitted.
-Makes the data illegible and meaningless if intercepted.
-Users with the encryption key software can unscramble the data when it arrives at its destination.

19
Q

Describe usernames & passwords:

A

-Users on a network are allocated a unique user ID and a randomly generated password.
-Users are required to change passwords regularly by the network software to enhance security.
-Each time a user logs on, the system checks their user ID and password against a database of user details.
-Network software can disable the user ID for a period of time after unsuccessful log on attempts.

20
Q

Describe access levels:

A

-Users are allocated different levels of access to files (eg in a school or office).
-Access rights can be classified as ‘read only’, ‘read & copy’ or ‘read & write’.
-Access rights are stored in a table linked to the user ID & password.

21
Q

Describe back up:

A

-If data is lost or becomes corrupted, the network should have a method of recovering the data.
-A file backup ensures that a copy of the data can be loaded or restored onto the system if the original is lost or corrupted (eg in the event of a fire).
-Network backups are usually automatically scheduled to run at certain times (eg at the end of the day)

22
Q

Describe firewalls:

A

-Computers on a network must be able to communicate with each other to allow data to be sent and received.
-In simple terms, they must be able to ‘speak the same langauge’.
-A communications protocol is an agreed standard set of rules for sending or receiving data in a network which allows computers to do this.
-Therefore if a computer receives data in a network, it must support the communications protocol of the sending computer.
-There are many different types of communications protocol (give examples where necessary) which are defined by organisations who manufacture network hardware and develop software.

23
Q

Describe the role of a protocol in data transfer:

A

-Computers on a network must be able to communicate with each other to allow data to be sent and received.
-In simple terms, they must be able to ‘speak the same langauge’.
-A communications protocol is an agreed standard set of rules for sending or receiving data in a network which allows computers to

24
Q

What is TCP/IP?

A

-Transmission Control Protocol/ Internet Protocol
-Uses the router to ensure that data travels in the correct network path to arrive at the correct computer.

25
Q

What is FTP?

A

-File Transfer Porotcol
-Widely used and allows user to send and receive files on the internet.
- Also used to send software updates to network devices (examples where necessary)
-To ensure data is sent in a secure way, data is encrypted and usernames and passwords are used ti prevent unauthorised access ti the file server.

26
Q

What is HTTP?

A

-Hypertext transfer protocol
-Used by the WWW to identify and transfer webpages using the internet.
-When a user enters a URL into the browser, this protocol sends a command to the web server to request the required webpage.
-If the page cannot be located (maybe it has been deleted or the user inputted the address incorrectly) the HTTP will report an error back to the user.
-These error messages are referred to as ‘status codes’ eg ‘404, file not found’

27
Q

What is HTTPS?

A

-Hypertext Transfer Protocol Secure
-Similar to HTTP but uses a SSL (secure socket layer) to ensure data is transmitted securely.
-Designed to allow access to a secure web server for secure data communication.
-Uses encryption for sending data and decryption for receiving it.
-Its main use is financial application such as e-commerce where payment transactions are managed on the WWW.
-Exolain differences between HTTPS & HTTP where necessary.

28
Q

What is the difference between HTTP and HTTPS?

A

-While using HTTP, it is possible to intercept data; an individual could gain access to a customer’s personal bank details eg credit card number.
-When using HTTPS, an individual could still gain access to the personal data.
-However, it would be scrambled and therefore meaningless due to the encryption and the usage of a SSL (secure socket layer).
-Web browsers display a padlock icon on screen to indicate the webpage currently in use is secure.

29
Q

What does SSL mean? What is it used for?

A

Secure socket layer. Encryption by HTTPS.

30
Q

Which data protocol encrypts data when sending it and decrypts it when receiving it?

31
Q

Which protocol is responsible for the command sent to request a webpage when a user enters a URL?

32
Q

Which protocol allows users to send and receive files in the internet?

33
Q

Which protocol sends software updates to network devices?