cyberspace, network security and data transfer Flashcards
What is Cyber Crime?
Using a computer to commit a crime
This includes viruses and other cyber crimes such as theft of personal information, stealing money from credit cards and theft of company data that could be sold to competitors
Explain Hacking
Gaining unauthorised access to a computer with the intention of corrupting or stealing data stored on a hard drive
Explain Cyber Stalking
Using technology to harass others such as sending inappropriate emails or making inappropriate comments on social media
Explain Pornography
Hiding malware when someone downloads adult content which increases the risk of someone’s data being corrupted by a virus or stolen by an unauthorised data
Explain Data Theft
Theft of personal data which are then used to commit identity theft
Explain Denial of Service
A malicious attack on a network, eg preventing users from logging on to access their data or email accounts
Explain Digital Forgery
Intentionally and falsely altering digital content.
Explain Cyber Defamation
Using the internet to intentionally damage the reputation of a person or organisation
Explain Spamming
Spamming is sending junk emails as a result the inbox becomes overloaded and time is wasted opening and reading such emails.
Explain Phishing
Sending emails that appear to be from a reliable source asking recipients to update their personal information which is then used by hackers
Explain Malware
Malware is a malicious software that is downloaded onto a computer unintentionally by using the internet or from email attachments, or even by connecting a portable storage device such as a USB storage device
Explain Virus
Virus is designed to deliberately damage or make a computer system unreliable by slowing down the processor
A virus can store itself automatically on a computer hard drive as a hidden file but can be activated when certain program is opened or when a predetermined condition is met
Explain Trojan Horse
Trojan horse gains entry to a user’s computer in disguise.
The user is tricked into thinking that it is a useful piece of software and then downloading and opening the trogin
This can do serious damage: deleting files or continuously change desktop layout
Main Purpose of Trojan Horses
Deleting Data Files
Explain Worms
Worms are designed to spread from computer around a network without the need to be attached to any documents or programs
A worm spreads itself around a computer system by replicating itself
It could copy itself into every contact in an email address book and then travel to each recipient when an email is sent
it can then repeat this process for the recipient
it can cause problems on a network as the worm requires bandwidth which results in slower data transmission speeds
Explain Keylogger
A piece of software designed to record a user’s keystrokes
The user is unaware that this is happening
The Key Strokes are saved as a log file and then sent to the person who created the software at a later stage.
key loggers can be used to steal information