Chapter 7 - Cyberspace, network security and data transfer Flashcards

1
Q

What is cyber crime?

A

Using a computer to commit a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are cyber criminals?

A

People involved in cyber crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give an example of cyber crime

A

Hacking bank accounts
Phishing
Theft of personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hacker?

A

A person who gains unauthorised access to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a virus?

A

Software designed to damage a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is cyber stalking?

A

Where individuals use technology to harass others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Social Media?

A

Websites and computer programs that allow people to communicate and share information on the internet using a computer or mobile phone:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data theft?

A

Stealing customer records to get personal details that are then used to commit identity fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is identity fraud?

A

Using someone else’s personal details to commit a crime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DDoS stand for?

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is DDoS?

A

A malicious attack on a network, sending so much traffic to a target that it can no longer access the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a web server?

A

Web servers are computers that store website data, and deliver web pages to internet users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is digital forgery?

A

Intentionally and falsely altering digital content. e.g. pictures or documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is cyber defamation?

A

Using the internet with the intention to damage the reputation of a person or organisation by posting slanderous messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is slander?

A

Making a false statement that damages a person’s reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spamming?

A

Sending bulk junk emails such as adverts for products

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Phishing?

A

Sending emails that appear to be from a reliable source that attempt to trick the recipient into revealing personal details or account information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is identity theft?

A

Stealing someone’s identity to commit a crime

19
Q

What is malware?

A

MALicious SoftWARE (malicious means bad)

20
Q

What is a Trojan Horse?

A

Malicious software that gains access to a computer by pretending to be a useful piece of software

21
Q

What is a worm?

A

Malware that spreads by replicating (copying) itself

22
Q

What is a key logger?

A

Software that records what a user types and sends it to a cyber-criminal

23
Q

What is spyware?

A

Malicious software secretly installed on a computer that collects information about a user and sends it to a cyber-criminal

24
Q

What is encryption?

A

Transmitted data is ‘scrambled’ so that it cannot be understood if it is intercepted.
The data can only be unscrambled (unencrypted) by using an encryption key

25
Q

What is verification?

A

Checking if something is true or accurate

26
Q

What are access levels?

A

Different users are given different access to data on a network.
E.g. Teachers might be able to see a student’s contact information, but a student can only see their own data.

27
Q

What access levels can be applied to a file?

A

Read-only
Read & copy
Read & Write

28
Q

What is read-only access?

A

The file can only be read, not changed

29
Q

What is read-copy access?

A

The file can be read and a copy made, but the original cannot be changed

30
Q

What is read-write access?

A

The file can be read, changed and saved

31
Q

What is data corruption?

A

When data becomes unusable, unreadable or inaccessible to a user or application

32
Q

What is a restore program?

A

A program that restores damaged files from a backup

33
Q

What is a firewall?

A

A hardware device or software program that monitors data entering and leaving a network

34
Q

What does TCP/IP stand for?

A

Transmission Control Protocol / Internet Protocol

35
Q

What is TCP/IP?

A

The protocols used to transfer data on the internet

36
Q

What does FTP stand for?

A

File Transfer Protocol

37
Q

What is FTP?

A

A protocol that allows files to be sent and received on the internet

38
Q

What is a 404 error?

A

An error that occurs when a webpage of file cannot be found on the internet

39
Q

What does HTTPS stand for?

A

HyperText Transfer Protocol Secure

40
Q

When is HTTPS used?

A

HTTPS is used to ensure that data is transmitted securely on the internet, especially for banking or payment appications.

41
Q

What does SSL stand for?

A

Secure Socket Layer

42
Q

What is SSL?

A

SSL makes an encrypted connection between a browser and a server

43
Q

What is a web browser?

A

A piece of software that displays web pages

44
Q

What is e-commerce?

A

Online shopping
Business transactions over the internet