computer misuse Flashcards

1
Q

What are three things to look out for in a typical phishing email?

A
  • Greeting not personalized
  • Sender’s address is a variation on a genuine address
  • Request for personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the Computer Misuse Act 1990 make illegal?

A

It’s illegal to look at or modify someone else’s files without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define hacking

A

Hacking is illegally accessing or modifying computer files without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

List some reasons why hackers hack

A
  • Pure mischief or challenge
  • To steal money
  • To steal or modify information
  • For political reasons or revenge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do hackers typically gain access to systems?

A
  • Exploiting security weaknesses in outdated software
  • Using obvious usernames and passwords
  • Tricking users into downloading malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does malware stand for?

A

Malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can malware do?

A
  • Gather personal or sensitive data
  • Modify or delete files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a logic bomb?

A

A logic bomb tells the computer to execute instructions at a certain date, time, or under specified conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is ransomware?

A

Ransomware is software that prevents access to files until a ransom is paid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What significant ransomware attack occurred in 2017?

A

The NHS and many others were affected by the WannaCry attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define a computer virus

A

A type of malware that replicates and installs itself without consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can a computer virus spread?

A
  • Through email
  • File sharing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are common types of malware?

A
  • Browser hijackers
  • File infectors
  • Macro viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are signs of malware? A new toolbar appears on your browser.

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following are signs of malware? You receive a fraudulent email.

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following are signs of malware? Your homepage has changed unexpectedly.

A

TRUE

17
Q

How can you avoid malware? Fill in the blank: Avoid clicking on everything, e.g. offers that seem too good to be ______.

A

true

18
Q

Why should you not use the same password for everything?

A

To prevent multiple accounts from being compromised if one password is stolen

19
Q

What is a commonly used password that should be avoided?

A

password1

20
Q

What should you do to keep your browser secure?

A

Keep your browser software up-to-date

21
Q

What is the significance of the Computer Misuse Act 1990?

A

It provides legal framework against unauthorized computer access and modification