Computer systems (Security) Flashcards

1
Q

What are the three things the Computer Misuse Act of 1990 supposed to stop?

A
  1. Unauthorised access to computer material
  2. Unauthorised access to the internet for further harm
  3. Unauthorised modification to computer programs or data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the actions considered to be Unauthorised access to a computer?

A
  1. Access files of other , when you don’t have their permission
  2. This can lead to 6 months in prison or a fine
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the actions considered to be Unauthorised access to the internet for further harm ?

A
  1. Accessing the files of someone without their permission this can is also called hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the possible reasons and methods for thew question above ?

A

Reasons include :

-they want to make the person look bad by impersonating them
-They want to steal bank information or other valuable info .

Methods include :

-phishing
-installing spyware
-guessing logins to websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the actions considered to be Unauthorised modification to computer material / data?

A
  • Hacking
    -Spreading/Creating viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are tracking cookies?

A

They are small files created when a user goes onto a website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do tracking cookies store ?

A

-Stores details which are then sent back to the cookies author

-logs the actions the person has done online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do tracking cookies allow for ?

A

Personalised adverts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Denial of Service attack ?

A

A Denial of Service attack occurs when someone floods a server or online resource with excessive messages to disrupt access for legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the symptoms of a Denial of Service attack ?

A

The server slows down a lot and you not being able to access some on the data in the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Reasons for a Denial of Service attack ?

A

Financial - bringing down a commercial website will cost that company money.

Political - prevent access to the website of a political rival.

Personal - the attacker may have a personal grudge against the owner of the website.

FPP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the types of faults that come with a Denial of Service attack ?

A

DNS attack
Bandwidth consumption
Resource starvation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Public And Private Keys ?

A

Public Keys - What they do is that the encrypt that data being sent to the other user (everyone knows this one)

Private Key - Only the end user receiving the message knows it and therefor they can only access it . It use is to decrypt the data sent by the other person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a digital certificate ?

A

All this does is that it allows a user to send data through the internet as it authenticates them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a digital signature ?

A

A digital signature is created when a message is sent using a private key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly