Computing Year 8 End of Year Exam Flashcards
What does a strong password consist of?
Between 10 and 15 characters as hackers can hack passwords shorter than this in under 4 hrs
A mixture of numbers, lowercase and uppercase characters and symbols as it makes it harder to guess.
What is black and white box testing
In black box testing, testers are give n no information about company they’re testing have to try and hack
In white box testing testers are given ‘insider’ information in order to see how much damage employees could do to systems.
What are black hat and white hat hackers?
Black hat - Hackers with criminal intent
White-hat - Ethical hackers that are employed to find faults in systems
What are grey hat hackers?
Grey hats - Frequently seek out system vulnerabilities without authorisation from system owners and then those are reported to the company for a ransom fee or are broadcasted on the internet.
What is malware
Short for malicious software - computer programs designed to infiltrate and damage computers
What is adware
Any software application in which advertising banners are displayed. Its justification is that it helps recover programming costs and it keeps software ‘free’ for the user.
What is spyware
Unwanted software that infiltrates computing device, stealing sensitive information. Classified as a type of malware.
What is phishing?
An online scam in which a victim receives a realistic-looking email e.g. from a bank with a link that can be used by the criminal to collect sensitive information
What is blagging?
Phycological techniques used by criminals to make a user more likely to act through the use of impersonation of friends or family.
What is shouldering?
Physically observing people putting in sensitive information into computers in order to gain that information e.g. looking at someone when they put their pin in at a cashpoint.
What is brute force?
A hacking method that uses trial and error to gain access to an account through guessing a password.
What is a virus?
A piece of malicious software that destroys computers and spreads between computers on a data system if accidently downloaded
What are worms?
A piece of malware that duplicates itself across many devices while remaining active on the original infected device
What are trojans?
A legitimate-looking piece of software that can take control of computers.
What are bots?
Software applications that are programmed to do certain tasks e.g. befriending someone in an online game.