Chapter 8 - Security and Ethics Flashcards

1
Q

What is hacking?

A

the act of gaining illegal access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is cracking?

A

the editing of program source code so it can be exploited/changed for a specific purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are viruses?

A

program code that can replicate/copy itself with the intention of deleting/corrupting data/files or causing the computer to malfunction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is phishing?

A

sending legitimate lookng emails to encourage uses to give out personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is pharming?

A

malicious code installed to redirect uses to a fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is spyware/key logging software?

A

gathers data by monitoring keypresses on user’s keyboards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are cookies?

A

pieces of data that allow detection of web pages viewed by a user and store their preferences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is accidental or malicious loss of data?

A

this could be due to accidentally deleting a file or to a malicious attack from viruses or hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are firewalls?

A

examines traffic between user’s computer and a public network - can help prevent viruses or hackers entering a user’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is secure sockets layer (SSL)?

A

allows data to be sent and received securely across a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is transport layer security (TLS)?

A

a protocol that is designed to ensure that no third party may eavesdrop or tamper with any message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is symmetric encryption?

A

a secret key which makes a message unreadable unless the recipient also has the decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is asymmetric encryption?

A

a form of encryption requiring both a public and private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is authentication?

A

used to verify that data comes from a trusted source

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a denial of service attack?

A

an attempt at preventing users from accessing part of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are ethics?

A

a set of principles set out to regulate the use of computers

17
Q

What is free software?

A

users have the freedom to run, copy, change or adopt free software

18
Q

What is freeware?

A

software which users can download free of charge

19
Q

What is shareware?

A

users are allowed to try out shareware for a trial period

20
Q

What can hacking lead to?

A

lead to identity theft and loss or corruption of data

21
Q

How can you minimise the risk of hacking?

A

using strong passwords

using firewalls

22
Q

Why is cracking done?

A

for malicious purposes (such as modifying legitimate software to do something like redirect a user to a fake website)

23
Q

How can you minimise the risk of cracking?

A

it is hard to do
software engineers need to make the act of breaking into the software nearly impossible (make it difficult to identify back doors)

24
Q

What do viruses cause computers to do?

A

run slow
crash
cause some software to run abnormally

25
How to reduce the risk of viruses?
running anti-virus software | don't open emails/software from unknown sources
26
What are the main signs that an email is a phishing email?
messages containing poor spelling/grammar asks for personal information unrealistic threats/promises made
27
How can you reduce the risk of pharming?
anti-spyware software can identify and remove pharming code on the hard drive
28
What is wardriving?
the act of locating and using wireless internet connections illegally can lead to stealing of internet time/bandwith
29
How can you prevent the risk of wardriving?
use of WEP (wired equivalent privacy) encryption complex passwords firewalls