Dark Side Of Computing Flashcards
What can bad programming lead to?
Bugs, security vulnerabilities, and incorrect data
Bad programming can be full of logic errors and may lack data validation techniques.
What are the consequences of poor training for users?
Users make mistakes and lose trust in the system
Poor training can lead to user errors that undermine system reliability.
What can result from a breakdown in user trust?
Decreased efficiency, reduced morale, increased workload, incorrect/delayed decision making
Frequent system failures can lead to users putting off work, creating workarounds, and making poor decisions.
How can information inaccuracy affect product quality?
Decreased product quality
This includes physical products and intangible information.
What are some methods for data protection?
Control access to physical data, limit use of portable storage, control access to computers
This includes locking rooms, password protection, and monitoring internet usage.
What is social engineering?
Manipulating people to gain access to their secrets or data
It often relies on tricking individuals into revealing sensitive information.
What is a common phishing attack sequence?
Receive email, click link, enter credentials on fake site
The fake site mimics a legitimate organization to steal user information.
What are the signs of phishing emails?
Too good to be true offers, requests for personal information, urgency
Examples include fake lottery winnings or job offers requiring payment.
What is malware?
Malicious software designed to infect a computer and disrupt normal operations
It can steal data, install more malware, and monitor user activity.
How can computers be infected with malware?
Opening infected files, installing infected software, visiting infected websites
Other methods include drive-by downloads and exploiting software vulnerabilities.
What is a Trojan horse in cybersecurity?
Malware disguised as a normal file or program
It tricks users into opening it, allowing attackers access to the computer.
What does spyware do?
Tracks computer and online activities without the user’s knowledge
It sends this data back to the creator of the spyware.
What is the purpose of ransomware?
To encrypt files on a computer and demand a ransom for decryption
Paying the ransom does not guarantee file recovery.
What distinguishes a worm from a virus?
Worms self-replicate and spread independently
Unlike viruses, worms do not require user action to propagate.
What is a rootkit?
Malware that hides its presence and allows remote access to a computer
It is difficult to detect and often requires a complete system wipe to remove.