Computer Systems : Security risks and percautions Flashcards

1
Q

Computer misuse act 1990

Unauthorised access to computer material

A

This is the lowest level of offence

This offence carries the risk of being sentenced to six months in prison and/or hefty fine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computer misuse act 1990

Unauthorised access with intent to commit a further offence.

A

Anyone caught doing this risks up to a five year prison sentence and/or a hefty fine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer misuse act 1990

Unauthorised modification of computer material

A

The offence relates to the deletion or changes made to files with the intent to cause damage to an indiviudal or company. The difference is ‘the intent to cause damage’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are tracking cookies

A

Tracking cookies are placed by ad-brokers to keep track of your web browsing across multiple pages that use their service, building a profile about your intrests and lifestyle to target adverts at you.

Tracking cookies can be blocked by ad-blocking extensions and apps,but many websites rely on advertising revenue for income.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DOS (Denial of Service) Attack

A

A Denial of Service attack is where an attacker tries to stop people accessing a web-based service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the symptoms of DOS (Denial of Service) attacks

A

User will experince slow response from the attacked website or may not be able to access the website altogether

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the effect of DOS (Denial of Service) attacks

A

Denial of Service attacks can cost targeted sites revenue and loss of reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the types of faults for DOS (Denial of Service) attacks

A

DOS attacks are based around bandwith consumption (flooding webistes with traffic), resource starvation (tying up key newtwok and server resources) or by attacking DNS servers whihc converts URL’s to IP addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the motives behind DOS (Denial of service) attacks

A

Motives for carrying out a Denial of Service attack include : curiosity, revenge, political reasons, commercial competion and cyber warfare.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a digital signiture

A

A digital signiture is an electronic signature that can be used to authenticate the identity of someone sending you information. It also confirms the intergrtiy of the document.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a digital certificate

A

A digital certifircate is an electronic document that contains an electronic signature and is used to confirm the idnetity of a person or organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between public keys andd private keys

A

Public keys are known to the public and is used to encyrpt the message.
Pricvate keys are only know to the recipent and is used to decrypt the message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly