Computer Management (p 55-62) Flashcards

1
Q

How is human error a threat to data?

A

When people enter invalid information into a computer, the computer will get invalid information in return (GIGO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can we restrict access to data and how will this protect the data?

A

Restrict access to data by setting up passwords and different types of accounts like admins and standard users. This will prevent attackers from stealing data or limiting other people’s influence on the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the following malware:
- Virus
- Worm
- Trojan
- Rootkit

A

Virus:
Software that gets loaded onto a computer unitentially and performs malicious actions

Worm:
Malware that replicates spreads between computers on network

Trojan:
Malware disguised as useful software. Once active attackers have access to your data

Rootkit:
Grants the attacker with remote access to your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Explain the following social engineering methods:
- Spoofing
- Phishing
- Pharming

A

Spoofing:
Attacker sends email and pretends its from a trusted person asking a favour

Phishing:
Attacker sends a an official looking email requesting sensitive info

Pharming:
Attackers create an official looking website that requests sensitive info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly