Computer systems (Security) Flashcards
What are the three things the Computer Misuse Act of 1990 supposed to stop?
- Unauthorised access to computer material
- Unauthorised access to the internet for further harm
- Unauthorised modification to computer programs or data
What are the actions considered to be Unauthorised access to a computer?
- Access files of other , when you don’t have their permission
- This can lead to 6 months in prison or a fine
What are the actions considered to be Unauthorised access to the internet for further harm ?
- Accessing the files of someone without their permission this can is also called hacking
What are the possible reasons and methods for thew question above ?
Reasons include :
-they want to make the person look bad by impersonating them
-They want to steal bank information or other valuable info .
Methods include :
-phishing
-installing spyware
-guessing logins to websites
What are the actions considered to be Unauthorised modification to computer material / data?
- Hacking
-Spreading/Creating viruses
What are tracking cookies?
They are small files created when a user goes onto a website
What do tracking cookies store ?
-Stores details which are then sent back to the cookies author
-logs the actions the person has done online
What do tracking cookies allow for ?
Personalised adverts
What is a Denial of Service attack ?
A Denial of Service attack occurs when someone floods a server or online resource with excessive messages to disrupt access for legitimate users.
What are the symptoms of a Denial of Service attack ?
The server slows down a lot and you not being able to access some on the data in the website
Reasons for a Denial of Service attack ?
Financial - bringing down a commercial website will cost that company money.
Political - prevent access to the website of a political rival.
Personal - the attacker may have a personal grudge against the owner of the website.
FPP
What are the types of faults that come with a Denial of Service attack ?
DNS attack
Bandwidth consumption
Resource starvation
What are Public And Private Keys ?
Public Keys - What they do is that the encrypt that data being sent to the other user (everyone knows this one)
Private Key - Only the end user receiving the message knows it and therefor they can only access it . It use is to decrypt the data sent by the other person
What is a digital certificate ?
All this does is that it allows a user to send data through the internet as it authenticates them
What is a digital signature ?
A digital signature is created when a message is sent using a private key.