Chapter7 -network secuirty Flashcards

1
Q

What is a hacker ?

A

A hacker is someone who tries to gain unauthorised access to your computer with the intention of corrupting or stealing data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is spamming ?

A

Sending bulk emails such as adverts for products. A large proportion of bandwidth is used so time is wasted opening and reading such emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Phishing ?

A

Sending emails that appear to be from a reliable source. Users will often be asked to update their info and this info will then be used by hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is malware ?

A

Malicious software that is downloaded onto a computer unintentionally by a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 3 types of malware ?

A
  • Trojan horses
  • worms
  • spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a virus ?

A

A program which is designed to damage a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can you protect yourself from viruses ?

A

Installing an antivirus programme that will regularly scan your computer for threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a trojan horse ?

A

It gains entry into a users computer ‘ in disguise’ . Once installed some can do major damage like deleting files or displaying annoying pop-ups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a worm ?

A

A worm spreads around from computer to computer in a network. It does this by replicating itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the problems with worm viruses ?

A

Worms require bandwidth which results in slower data transmission speeds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a key logger ?

A

It records a users keystrokes. The user is unaware that this is happening. it is used to steal personal info from the user ( also used by employers to monitor employees activities)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spyware ?

A

It uses the internet connection to monitor things like the websites a user visits. It can also be used to gather personal and bank details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the problems with spyware ?

A

It uses valuable memory in some cases the info is sold to a third-party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is data encryption ?

A

The process of scrambling data using a ‘key’ before it is transmitted onto a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the network manager allocated every user ?

A
  • A unique username

- users can choose their own password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name 4 ways networks are protected ?

A
  • usernames and passwords
  • access levels
  • backup
  • firewall
17
Q

Name and describe the three levels of access

A
  • Read only : users can only view the file
  • Read and copy : users can view and replicate the file
  • Read and write : users can view and edit the files
18
Q

How are backups used to protect a network ?

A

Backup copies of data are stored on a variety of storage media in safe locations away from the network server e.g and external hard drive

19
Q

What is a firewall ?

A

A piece of software or hardware that is used to monitor and filter data that is entering or leaving a network.

20
Q

What can firewalls do ?

A
  • prevent hackers from entering the network via the internet
  • prevents viruses and spam from entering the network
  • prevents users downloading undesirable content
21
Q

What is a communication protocol ?

A

This is a set of rules used to allow different computers from different manufacturers to communicate

22
Q

What transfer protocol is used for the internet ?

A

TCP/IP (transmission control protocol/ internet protocol)

23
Q

What does FTP stand for and what is it used for ?

A

(File transport protocol) allows users to send and receive files over the internet.

24
Q

What is Http and what does it stand for ?

A

(hyper text transfer protocol ) used by the WWW to identify and transfer web pages using the internet.

25
Q

How does Http work ?

A

When the user enters a URL this protocol sends a command to the web server to request the required web page.

26
Q

How does Https work and what does it stand for ?

A

( hypertext transfer protocol secure) similar to http but uses a secure socket layer to ensure data is transmitted securely.

27
Q

What are the main uses of Https ?

A

e-commerce such as :

  • credit card transactions
  • bank information
28
Q

How is Https made safer ?

A

Data is encrypted when being transferred via this method