Chapter 8 - Security and Ethics Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is hacking?

A

the act of gaining illegal access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cracking?

A

the editing of program source code so it can be exploited/changed for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are viruses?

A

program code that can replicate/copy itself with the intention of deleting/corrupting data/files or causing the computer to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing?

A

sending legitimate lookng emails to encourage uses to give out personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is pharming?

A

malicious code installed to redirect uses to a fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware/key logging software?

A

gathers data by monitoring keypresses on user’s keyboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are cookies?

A

pieces of data that allow detection of web pages viewed by a user and store their preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is accidental or malicious loss of data?

A

this could be due to accidentally deleting a file or to a malicious attack from viruses or hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are firewalls?

A

examines traffic between user’s computer and a public network - can help prevent viruses or hackers entering a user’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is secure sockets layer (SSL)?

A

allows data to be sent and received securely across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is transport layer security (TLS)?

A

a protocol that is designed to ensure that no third party may eavesdrop or tamper with any message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is symmetric encryption?

A

a secret key which makes a message unreadable unless the recipient also has the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is asymmetric encryption?

A

a form of encryption requiring both a public and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is authentication?

A

used to verify that data comes from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a denial of service attack?

A

an attempt at preventing users from accessing part of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are ethics?

A

a set of principles set out to regulate the use of computers

17
Q

What is free software?

A

users have the freedom to run, copy, change or adopt free software

18
Q

What is freeware?

A

software which users can download free of charge

19
Q

What is shareware?

A

users are allowed to try out shareware for a trial period

20
Q

What can hacking lead to?

A

lead to identity theft and loss or corruption of data

21
Q

How can you minimise the risk of hacking?

A

using strong passwords

using firewalls

22
Q

Why is cracking done?

A

for malicious purposes (such as modifying legitimate software to do something like redirect a user to a fake website)

23
Q

How can you minimise the risk of cracking?

A

it is hard to do
software engineers need to make the act of breaking into the software nearly impossible (make it difficult to identify back doors)

24
Q

What do viruses cause computers to do?

A

run slow
crash
cause some software to run abnormally

25
Q

How to reduce the risk of viruses?

A

running anti-virus software

don’t open emails/software from unknown sources

26
Q

What are the main signs that an email is a phishing email?

A

messages containing poor spelling/grammar
asks for personal information
unrealistic threats/promises made

27
Q

How can you reduce the risk of pharming?

A

anti-spyware software can identify and remove pharming code on the hard drive

28
Q

What is wardriving?

A

the act of locating and using wireless internet connections illegally
can lead to stealing of internet time/bandwith

29
Q

How can you prevent the risk of wardriving?

A

use of WEP (wired equivalent privacy) encryption
complex passwords
firewalls