Cyberspace, network security and data transfer Flashcards
What is Cyber Crime?
Using a computer to commit a crime
Explain Hacking
Gaining unauthorised access to a computer with the intention of corrupting or stealing data stored on a hard drive
Explain Pornography
Hiding malware when someone downloads adult content which increases the risk of someone’s data being corrupted by a virus or stolen by an unauthorised data
Explain Cyber Stalking
Using technology to harass others such as sending inappropriate emails or making inappropriate comments on social media
Explain Data Theft
Theft of personal data which are then used to commit identity theft, eg passport applications
Explain Denial of Service
A malicious attack on a network, eg preventing users from logging on to access their data or email accounts
Explain Digital Forgery
Intentionally and falsely altering digital content. eg changing passport photographs and sell to criminals
Explain Cyber Defamation
Using the internet to intentionally damage the reputation of a person or organisation
Explain Spamming
Spamming is sending junk emails as a result the inbox becomes overloaded and time is wasted opening and reading such emails.
Explain Phishing
Sending emails that appear to be from a reliable source asking recipients to update their personal information which is then used by hackers
Explain Malware
Malware is a malicious software that is downloaded onto a computer unintentionally by using the internet or from email attachment
Explain Virus
Virus is a program that attaches itself into a file and once the file is opens it spreads itself to different computers on the same network
Explain Trojan Horse
Trojan horse gains entry to a user’s computer in disguise and tricks the user by encouraging them to open and download a software program that they require.
Explain Worms
Worms spread around a computer system by replicating itself. Spreads around the network without the need to be attached to any to any document or program
Explain Keylogger
Designed to record keyboard activities performed by users(known as ‘keystrokes’)
Keystrokes are saved as log file and then sent to the person who created the program
Main Purpose of Keyloggers
Steal Banking Information
Main Purpose of Trojan Horses
Deleting Data Files
Explain Spyware
Software is secretly installed on a user’s computer from the internet
What does Spyware do?
Tracks user activities
Example credit card and password details when used on websites
Explain Data Encryption
Uses special software to encode(converted into a code form) or scramble data before it is transmitted
What does Data Encryption do?
This makes the data unreadable or meaningless if intercepted
Users with the encryption key software can unscramble the data when it arrives at its destination
Explain Usernames and Password
users on a network are allocated a unique user ID and a randomly generated passwords
Each time a user logs on the system checks their user ID and password to grant the user access to data
Why should a user have a strong password
To help reduce data theft
How to make a password secure?
Regularly changed
at least 8 characters, one uppercase characters
atleast one special character such as #$?
Explain what a network manager has control over?
Who has been on the network
Location of the Computer
Explain Access Levels
Users are allocated different levels of access to files
Types of Access:
Read Only
Read and Copy
Read and Write
What happens if user doesn’t have the correct level of access?
They will be denied access
What is a backup?
A backup is a copy of an original fine just in case it is deleted accidently or corrupted
Explain Backup
If data is lost or damaged, the network should have a method of recovering the data
Network backups are scheduled to run at certain times,example end of each day
Explain Firewalls
Firewalls monitor and filter data entering or leaving a network
Blocks data which do not obey the organisation rules
Expand FTP
File Transfer Protocol
Explain FTP
File Transfer Protocol allows uses to download or upload files over internet
Encryption is Used for Safety
What is a Protocol?
A set of rules to allow for communication between two different computer systems
Expand HTTP
Hypertext Transfer Protocol
Explain HTTP
Hypertext Transfer protocol is used by www to transfer webpages over the internet
What will the HTTP report if webpage isnt found?
Error 404 not found
is displayed
Expand HTTPS
Hypertext Transfer Protocol Secure
Explain HTTPS
Hypertext Transfer Protocol Secure uses SSL to ensure data is transmitted securely over the internet
Uses Encryption for sending data
Uses Decryption for receiving data
What is the main use of HTTPS
Financial transactions
What do worms do?
Slow data transmission speeds