Chapter 8 - Security and Ethics Flashcards
What is hacking?
the act of gaining illegal access to a computer system
What is cracking?
the editing of program source code so it can be exploited/changed for a specific purpose
What are viruses?
program code that can replicate/copy itself with the intention of deleting/corrupting data/files or causing the computer to malfunction
What is phishing?
sending legitimate lookng emails to encourage uses to give out personal data
What is pharming?
malicious code installed to redirect uses to a fake website
What is spyware/key logging software?
gathers data by monitoring keypresses on user’s keyboards
What are cookies?
pieces of data that allow detection of web pages viewed by a user and store their preferences
What is accidental or malicious loss of data?
this could be due to accidentally deleting a file or to a malicious attack from viruses or hacking
What are firewalls?
examines traffic between user’s computer and a public network - can help prevent viruses or hackers entering a user’s computer
What is secure sockets layer (SSL)?
allows data to be sent and received securely across a network
What is transport layer security (TLS)?
a protocol that is designed to ensure that no third party may eavesdrop or tamper with any message
What is symmetric encryption?
a secret key which makes a message unreadable unless the recipient also has the decryption key
What is asymmetric encryption?
a form of encryption requiring both a public and private key
What is authentication?
used to verify that data comes from a trusted source
What is a denial of service attack?
an attempt at preventing users from accessing part of a network
What are ethics?
a set of principles set out to regulate the use of computers
What is free software?
users have the freedom to run, copy, change or adopt free software
What is freeware?
software which users can download free of charge
What is shareware?
users are allowed to try out shareware for a trial period
What can hacking lead to?
lead to identity theft and loss or corruption of data
How can you minimise the risk of hacking?
using strong passwords
using firewalls
Why is cracking done?
for malicious purposes (such as modifying legitimate software to do something like redirect a user to a fake website)
How can you minimise the risk of cracking?
it is hard to do
software engineers need to make the act of breaking into the software nearly impossible (make it difficult to identify back doors)
What do viruses cause computers to do?
run slow
crash
cause some software to run abnormally
How to reduce the risk of viruses?
running anti-virus software
don’t open emails/software from unknown sources
What are the main signs that an email is a phishing email?
messages containing poor spelling/grammar
asks for personal information
unrealistic threats/promises made
How can you reduce the risk of pharming?
anti-spyware software can identify and remove pharming code on the hard drive
What is wardriving?
the act of locating and using wireless internet connections illegally
can lead to stealing of internet time/bandwith
How can you prevent the risk of wardriving?
use of WEP (wired equivalent privacy) encryption
complex passwords
firewalls