Computer security and ethics Flashcards
What is hacking, what are its effects, and how can it be prevented?
Hacking is the act of gaining illegal access to information on the computer. It can be obtained through hacking into a computer system, or into someone’s account.
Effects include corruption of data, identity theft, theft of other private information, etc.
Firewalls, strong passwords, and anti-hacking software can be used as a method of prevention.
What are viruses, what are its effects, and how can it be prevented?
They are programs that can replicate themselves in order to corrupt or delete files, or causes the computer to malfunction.
It can cause applications and the computer system as a whole to crash. It can cause corruption of files, theft of information, and render hardware useless.
Installing anti-virus software, and taking care when dealing with the internet.
What is phishing, what are its effects, and how can it be prevented?
Practice of sending out emails, seemingly from reputable companies, in order to trick users into giving their personal information away.
It can lead to misuse of private information, as well as to transferring virus or other dangerous software into the victim’s computer.
Use a filter for emails; be cautious
What is pharming, what are its effects, and how can it be prevented?
Practice of sending Internet users to a bogus website, as a result of malicious code installed in their computers, that mimics a reputable one, in order to obtain private information from them.
It can lead to misuse of private information, as well as to transferring virus or other dangerous software into the victim’s computer.
Anti-spyware software
What is wardriving, what are its effects, and how can it be prevented?
Locating and using illegally wireless internet connection.
Theft of personal information, using up someone’s internet connection
WEP encryption, strong passwords for wifi networks , firewalls
What is key-logging software, what are its effects, and how can it be prevented?
Software that gathers information about a person by monitoring the presses on the user’s keyboard
Theft of personal information, the computer system may be ruined
Anti-spyware software, Taking caution, Do not type important passwords
What is a firewall?
It is a software/hardware that blocks unauthorized access to the user’s information and files via the internet.
What are the things a firewall can do?
- Checking incoming and outgoing data against a set of filters. If the data does not meet the criteria, the user is given a warning.
- Keeps a list of all undesirable IP addresses.
- Prevents hackers and viruses into the user’s computer
- If the software or hardware of the user’s computer is trying to access an external source, the user is given a signal, so that they can choose whether to permit or not.
What are the things a firewall cannot do?
- It cannot prevent users from using their own modems to bypass the firewall.
- It cannot control use of accounts and passwords.
- There is nothing it can do if users disable the firewall.
What is a proxy server and what are its functions?
It is an intermediary through which internet requests are processed.
It can act as a firewall.
It can keep the user’s IP address a secret.
They speed up users access to websites through using caches.
They filter internet traffic.
What is SSL?
It is a security protocol that makes sure that all information transferred between a web browser and server is encrypted, and therefore safe.
How does SSL work?
- User types a URL since they want access to a website.
- The web browser connects with the website and requests that it identifies itself.
- The web server responds by sending an SSL certificate to the browser.
- If the browser can authenticate the certificate, it sends a message to the server to let communication begin.
- The server acknowledges the message and the two-way encrypted data transfer begins.
What is TLS?
TLS is a predecessor of the SSL system, it provides better security.
How does TLS work?
It makes sure that during an exchange or data transfer, there is no hacking.
What are the layers that TLS is made of, and what are the functions of each?
- Record protocol - It is responsible for securing data and verifying integrity and origin.
- Handshake protocol - Establishes a secure session by authenticating the web server.