Chapter7 -network secuirty Flashcards
What is a hacker ?
A hacker is someone who tries to gain unauthorised access to your computer with the intention of corrupting or stealing data
What is spamming ?
Sending bulk emails such as adverts for products. A large proportion of bandwidth is used so time is wasted opening and reading such emails
What is Phishing ?
Sending emails that appear to be from a reliable source. Users will often be asked to update their info and this info will then be used by hackers.
What is malware ?
Malicious software that is downloaded onto a computer unintentionally by a user
Name 3 types of malware ?
- Trojan horses
- worms
- spyware
What is a virus ?
A program which is designed to damage a computer system
How can you protect yourself from viruses ?
Installing an antivirus programme that will regularly scan your computer for threats.
What is a trojan horse ?
It gains entry into a users computer ‘ in disguise’ . Once installed some can do major damage like deleting files or displaying annoying pop-ups.
What is a worm ?
A worm spreads around from computer to computer in a network. It does this by replicating itself.
What are the problems with worm viruses ?
Worms require bandwidth which results in slower data transmission speeds
What is a key logger ?
It records a users keystrokes. The user is unaware that this is happening. it is used to steal personal info from the user ( also used by employers to monitor employees activities)
What is spyware ?
It uses the internet connection to monitor things like the websites a user visits. It can also be used to gather personal and bank details
What are the problems with spyware ?
It uses valuable memory in some cases the info is sold to a third-party
What is data encryption ?
The process of scrambling data using a ‘key’ before it is transmitted onto a network
What does the network manager allocated every user ?
- A unique username
- users can choose their own password
Name 4 ways networks are protected ?
- usernames and passwords
- access levels
- backup
- firewall
Name and describe the three levels of access
- Read only : users can only view the file
- Read and copy : users can view and replicate the file
- Read and write : users can view and edit the files
How are backups used to protect a network ?
Backup copies of data are stored on a variety of storage media in safe locations away from the network server e.g and external hard drive
What is a firewall ?
A piece of software or hardware that is used to monitor and filter data that is entering or leaving a network.
What can firewalls do ?
- prevent hackers from entering the network via the internet
- prevents viruses and spam from entering the network
- prevents users downloading undesirable content
What is a communication protocol ?
This is a set of rules used to allow different computers from different manufacturers to communicate
What transfer protocol is used for the internet ?
TCP/IP (transmission control protocol/ internet protocol)
What does FTP stand for and what is it used for ?
(File transport protocol) allows users to send and receive files over the internet.
What is Http and what does it stand for ?
(hyper text transfer protocol ) used by the WWW to identify and transfer web pages using the internet.
How does Http work ?
When the user enters a URL this protocol sends a command to the web server to request the required web page.
How does Https work and what does it stand for ?
( hypertext transfer protocol secure) similar to http but uses a secure socket layer to ensure data is transmitted securely.
What are the main uses of Https ?
e-commerce such as :
- credit card transactions
- bank information
How is Https made safer ?
Data is encrypted when being transferred via this method