Computer And Networks Security Flashcards
Firewall
Barrier between internal network and Internet or untrusted networks.
Prevents unauthorised access and protect from types of cyberthreats.
Virus
Infects some executable software which causes that software to spread the virus.
Contain payload which performs other malicious actions.
Worm
Self replicate and actively transmit itself over a network to infect other computers.
They do not need to attach themselves to an existing program.
They cause harm to networks by consuming bandwidth.
Spyware
Collects small amounts of data about users without their knowledge.
Can slow computers by reporting internet surfing habits, changing settings, installing additional software and redirecting web browsers.
Adware
Automatically displays or download ads to computer.
Usually integrated with spyware and displays ads related from spying.
Phishing
Attempting to acquire sensitive information such as usernames, passwords, bank account info’s by masquerading as a trustworthy entity.
Social engineering
Act of manipulating people into performing actions or divulging confidential information rather than by breaking in or using technical vulnerabilities.
Leads to data breaches, unauthorized access, and financial loss.
How to protect computer from attacks
Keep software up to date, use antivirus software.
Use strong passwords, unique one and never reuse them.
Install and maintain firewalls helps block unauthorized access to network.
Use encryption to make data unreadable to unauthorized parties.
Implement access controls to ensure only authorized users access your network.
Regularly back up data to recover it in case of cyberattacks or disaster.
Use 2 step verification
3 functions of antivirus software
Scan and Detection
Removal and Quarantine
Real time Protection
Describe how malware can affect a system’s reliability and performance.
System crash
Sluggish performance
Reduced storage capacity
Network congestion
System instability
Data loss
BIOMETRIC SYSTEMS
verify or recognize identity of a person based on their unique physical or behavioral characteristics, such as fingerprints, facial recognition, iris/retina scans, voice recognition, or DNA analysis.
Used for security purposes.
Describe THREE characteristics of biometric security systems
Uniqueness: rely on unique biological or behavioral characteristics specific to each individual.
Accuracy: measured in terms of False Acceptance Rate (FAR) and False Rejection Rate (FRR).
Security: more secure than passwords or PINs, because biometric traits cannot be easily replicated or stolen.
Advantages of biometric systems
High security, harder to gain access.
Convenient and fast way for users to authenticate their identity without remembering passwords or carry identification cards.
More accurate and easy to use.
Disadvantages of biometric systems
Cost: expensive to implement and maintain hardware, software, and infrastructure required for biometric systems.
Cybersecurity
Monitor and protect against online attacks.
Ex: hacking, snooping, phishing, online spying.