Computer Management -Module 1.3 Flashcards
What is malware?
Malicious software specifically designed to install itself without the users knowledge to affect/harm the computer system.
5 Threats/ Types of Malware
Virus Computer worm Spyware Trojan Root kit
True or false?
A virus needs human action to trigger its negative playload.
True
True or false?
A computer worm needs human action to travel over the computer network.
False
What is a rootkit?
A collection of programs designed to infiltrate a computer no gain the highest level of privileges to take control of the infected computer.
Define a kit.
A collection of programs that can be downloaded from the Internet and adapted.
Name five human issues when speaking about threats to a computer.
Accidentally deleting files or reformatting a disk
Not ensuring regular backups are made
Entering incorrect data into a program
Losing or misplacing portable storage devices
Allowing unauthorized users to get access to data
Name two types of Social Engineering
Phishing
Spoofing
What is phishing?
Fishing for information by fooling a user into giving out confidential information.
Name three types of hardware issues.
Hardware failure
Hardware theft
Power problems
Power problems can be a result of?
Data in RAM not saved into storage in a power failure
Data corrupted when written back into storage
Damage caused to the hardware (due to power outages)
What does GIGO stand for?
Garbage In, Garbage Out
When backing up, dedicated programs have options of?
Scheduling when to backup the files
Choosing to do full back up of all files or just those that have been changed since the last backup
Compressing the files to save space on the backup media
Advantages of online backup services
(Limited) free storage space
Synchronizing data files across all your devices to make sure you always have the latest dat files
Sharing files with other users
Being able to access your files wherever you have Internet connection
Give 5 tips when backing up your data
Programs can be reinstalled, only back up data
Automate/schedule backup software so that you don’t forget
Archive large files you seldom use
Backup your files to no external device such as a portable hard drive
Do not have multiple files of the same things on your computer (housekeeping)
Physical measures to restrict access to data
Physical security by controlling access to a building
Biometric security measures (fingerprint scanners)
Placing computers with confidential information in a lockable room/cabinet
5 Categories of threats to data
Unauthorized access to data Malware threats Human issues Natural disasters Hardware and software issues
Basic software measures
Set strong passwords, change them regularly, don’t reuse the same password
Permission can be given to certain users but they cannot edit the data
What is encryption?
Scrambling text or data into a new format using a specified set of rules
2 Advantag s of using anti-malware products
Generally cheaper than separate utilities
Protection is much easier, won’t interfere with other security programs
3 Ways to reduce malware threats
Use of anti-malware products
Keeping software up to date
Firewalls
Name 3 common sense precautions when reducing the human risk factor
Automate process by scheduling backups and updates
Set strong passwords
Keep your anti-malware and operating system updated
5 Precautions to take when you are online
Be aware of potential dangers and threats
Don’t give out any personal information, unless you are sure it is legitimate
Be careful when clicking on links
Only use secure sites
Don’t respond to phishing emails
4 Ways in avoiding the Social Engineering tricks
Avoid contact from uninvited sources
Guard your personal information
Pay attention to the URL of the website
Nothing is usually free
What does UPS stand for?
Uninterruptible Power Supply
What does RAID stand for?
Redundant Array of Inexpensive/Independent Disks
What is a UPS?
A device that puts a battery and a management system between a computer and the mains power supply to ensure that if there is a power outage it gives the computer a bit of power to shut down properly
What does RAID do?
Allows the computer to trade an array of disks as one to increase protection
Name one main characteristic of a computer
Accuracy
How can we ensure our software works? Name 3 ways
Producing the correct output
Reducing the GIGO effect
Ensuring our program can act to any situation without crashing
Computers can never really check for correctness. How can we ensure the accuracy of data?
Do everything we can to ensure data validity
Getting the computer to obtain input directly from the input rather than a human
Send users copies of data to ensure it is correct
Comparing the original source with captured data
What is data validation?
Any technique that can reduce the number of errors that can be made during the input of data
Methods and techniques used in data validation
Minimizing user input Format checks Data type checks Range checks Presence check