DIT Flashcards
what is an ad-hoc network?
a temporary network
what is an example of an ad-hoc network?
a smart phone and a smart watch connected
what is the problem with using an open network?
data is not encrypted
why do rural areas / countryside not have broadband but cities do?
too expensive for broadband companies to install
what does synchronization mean?
having the same data in 2 or more locations
list 2 features of cloud computing
online application software apps and online storage and emails
state 2 impacts of modern technologies on infrastructure
buying hardware and regular back up
state 1 impact of modern technologies for those working from home
can work around family
state 1 positive impact of modern technologies for working practices
can use collaboration tools like live online meetings and chat apps
state 1 negative impact of modern technologies for working practices
can waste time on chat apps and broadband could be poor
state 2 collaboration tools
shared calendar, shared notice board and chat apps
state 2 ways to make an interface accessible for others
zoom in and out, audio, text to speech
state 2 reasons why people attack networks
fun, challenge and financial gain
state 6 examples of malware
virus, trojan, worm, rootlet, spyware and ransomware
state 4 examples of social engineering
phishing, pharming, blogging and shouldering
how does the ‘man in the middle’ attack work?
intercepting data packets that are sent between devices
state 5 methods of device hardening
firewall, anti-virus, encryption, security patches and updates
what is 2 factor authentication?
where you need to provide 2 pieces of evidence to log in to a network
what does a firewall do?
stops unwanted data packets entering a network
what is a drawback of a firewall?
it can reject authentic data packets
what is the purpose of penetration testing?
to identify vulnerabilities within a network
what does a black hat hacker do?
illegally hacks into networks
what does a white hat hacker do?
is paid by the organization to try and hack into a network, to find vulnerabilities
what does a grey hat hacker do?
illegally hacks into a network without the knowledge of the organization however they inform them and provide information about how they hacked in
what are 2 internal threats?
accidentally losing data snd giving data away on purpose
what are 4 impacts on the business of a data breach?
downtime, loss of data, loss of money and loss of reputation
what does traditional computing involve?
using software on a device and saving the work on that device rather than online / on the cloud
what does cloud computing involve?
saving work online and using online apps