cyberspace, network security and data transfer Flashcards
What is Cyber Crime?
Using a computer to commit a crime
This includes viruses and other cyber crimes such as theft of personal information, stealing money from credit cards and theft of company data that could be sold to competitors
Explain Hacking
Gaining unauthorised access to a computer with the intention of corrupting or stealing data stored on a hard drive
Explain Cyber Stalking
Using technology to harass others such as sending inappropriate emails or making inappropriate comments on social media
Explain Pornography
Hiding malware when someone downloads adult content which increases the risk of someone’s data being corrupted by a virus or stolen by an unauthorised data
Explain Data Theft
Theft of personal data which are then used to commit identity theft
Explain Denial of Service
A malicious attack on a network, eg preventing users from logging on to access their data or email accounts
Explain Digital Forgery
Intentionally and falsely altering digital content.
Explain Cyber Defamation
Using the internet to intentionally damage the reputation of a person or organisation
Explain Spamming
Spamming is sending junk emails as a result the inbox becomes overloaded and time is wasted opening and reading such emails.
Explain Phishing
Sending emails that appear to be from a reliable source asking recipients to update their personal information which is then used by hackers
Explain Malware
Malware is a malicious software that is downloaded onto a computer unintentionally by using the internet or from email attachments, or even by connecting a portable storage device such as a USB storage device
Explain Virus
Virus is designed to deliberately damage or make a computer system unreliable by slowing down the processor
A virus can store itself automatically on a computer hard drive as a hidden file but can be activated when certain program is opened or when a predetermined condition is met
Explain Trojan Horse
Trojan horse gains entry to a user’s computer in disguise.
The user is tricked into thinking that it is a useful piece of software and then downloading and opening the trogin
This can do serious damage: deleting files or continuously change desktop layout
Main Purpose of Trojan Horses
Deleting Data Files
Explain Worms
Worms are designed to spread from computer around a network without the need to be attached to any documents or programs
A worm spreads itself around a computer system by replicating itself
It could copy itself into every contact in an email address book and then travel to each recipient when an email is sent
it can then repeat this process for the recipient
it can cause problems on a network as the worm requires bandwidth which results in slower data transmission speeds
Explain Keylogger
A piece of software designed to record a user’s keystrokes
The user is unaware that this is happening
The Key Strokes are saved as a log file and then sent to the person who created the software at a later stage.
key loggers can be used to steal information
Main Purpose of Keyloggers
Steal Banking Information
Explain Spyware
Malicious Software which is secretly installed on a user’s Computer.
an internet information about Connection to collect information about activity Such as the websites they visit.
What does Spyware do?
Tracks user’s activity such as credit card information and password details.
In some cases user information is Collected and then sold on to third party advertisers to allow them to market products to a number of users.
What are some signs of spyware on your computer
Uses Valuable Computer memory which can Cause applications to crash due to lack of memory available.
Explain Data Encryption
Encryption uses special to encode or ‘scramble’ data before it is transmitted to make data unreadable or meaningless if intercepted.
Only a user with the encryption key Software can unscramble the data when it arrives. at its destination۰
What does Data Encryption do?
This makes the data unreadable or meaningless if intercepted
Users with the encryption key software can unscramble the data when it arrives at its destination
Explain Usernames and Password
users on a network are allocated a unique user ID and a randomly generated passwords
Each time a user logs on the system checks their user ID and password to grant the user access to data
How to make a password secure?
It should have unique login Credential
Passwords should be strong enough character. long, mix of letters. at least one upper case and digits and incluse. Character
Password Should be regularly changed.
Password Should appear as a asterisk (*) So others
users cannot see the password
Why should a user have a strong password
To help reduce data theft
Explain what a network manager has control over?
Who has been on the network
Location of the Computer
Explain Access Levels
Users are allocated different levels of access to files
Types of Access:
Read Only
Read and Copy
Read and Write
What happens if user doesn’t have the correct level of access?
They will be denied access
What is a backup?
A backup is a copy of an original file just in case it is deleted accidently or corrupted
Explain Backup
If data is lost or damaged, the network should have a method of recovering the data
Network backups are scheduled to run at certain times, example end of each day
Explain Firewalls
Firewalls monitor and filter data entering or leaving a network
Blocks data which do not obey the organisation rules
Expand FTP
File Transfer Protocol
Explain FTP
File Transfer Protocol allows uses to download or upload files over internet
Encryption is Used for Safety
What is a Protocol?
A set of rules to allow for communication between two different computer systems
Expand HTTP
Hypertext Transfer Protocol
Explain HTTP
Hypertext Transfer protocol is used by www to transfer webpages over the internet
What will the HTTP report if webpage isn’t found?
Error 404 not found
is displayed
Expand HTTPS
Hypertext Transfer Protocol Secure
What is the main use of HTTPS
Financial transactions
Explain HTTPS
Hypertext Transfer Protocol Secure uses SSL to ensure data is transmitted securely over the internet
Uses Encryption for sending data
Uses Decryption for receiving data
What do worms do?
Slow data transmission speeds
What does a virus protection software do?
Virus protection software can be installed on computers to prevent potential attacks regular scans but would need to be updated daily to take account of new viruses.