DTE Revision Flashcards

1
Q

Keylogging

A

A type of surveillance technology used to monitor and record each keystroke on a specific device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sniffing

A

“Sniffing” is a process of monitoring and capturing all data packets passing through a given network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Metadata

A

Is data about data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware

A

Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Hacking

A

Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Computer network

A

A computer network is when two or more computers connect together which allows them to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protocols

A

All methods of communication need rules in place in order to pass on messages successfully. These sets of rules are called protocols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network hardware

A

There are a number of pieces of hardware that are needed in order to create a network. These include:
Network cable
Hub
Server
Router
WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Payload

A

Part of the message sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packets

A

Networks send and receive messages in small units of data known as “Packets”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bandwidth

A

Bandwidth is the amount of data that can be moved from to another in a given time. Higher bandwidth = more data per second

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Privacy policy

A

Privacy policy is a statement that explains in simple language how an organisation or agency handles your personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Equifax

A

Equifax stores information on everyone who has a credit score. This information includes private datat like social security numbers and whether or not you pay your bills on time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Encryption/Decryption

A

Encryption: The process of encoding a plain text message in some secret way is called encryption. The process that reverses encryption taking a secret message and reproducing the original plaintext, is called decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Caesar Cipher

A

A technique for encryption that shifts the alphabet by some number of characters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cipher

A

The generic term for a technique that performs encryption

17
Q

Cracking encryption

A

When you attempt to decode a secret message without knowing all the specifics of the cipher

18
Q

Random substitution cipher

A

Instead of just shifting the alphabet every letter is matched randomly to a different letter.

19
Q

Single factor authentication

A

Something you know: Example password

20
Q

Two factor authentication

A

Something you know: Example password and Something you possess: Example phone

21
Q

Multifactor authentication

A

Something you know: Example password and Something you possess: Example phone and something you are: Example fingerprint

22
Q

Multifactor authentication example

A

Examples of Multifactor Authentication:
Email codes
Text tokens
Biometric verification (such as fingerprint identification or facial recognition)
Hardware tokens
Security questions
Face ID

23
Q

Digital footprint

A

A history of all the activity you do online things that contribute to it: Social media posts, websites you visit, any information you share online

24
Q

Phishing

A

Phishing is a way cyber criminals can trick you into accessing your information

25
Cryptography
Hiding and coding information so only one person can access that information. It's been used for code messages, passwords, bank details
26
The internet
The Internet is a global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices
27
Oceanic cables
An oceanic cable is a cable laid on the ocean floor between land-based stations. These cables transmit data between continents, including email, webpages, and video calls.
28
Digital footprint tips
Tips: 1. Know what your footprint says about you 2. Manage your privacy settings 3. Manage your cookies 4. Think before you share
29
TCP
Transmission control protocol, splits the messages sent across the internet into smaller pieces called "Packets
30
Wired Networks
Wired networks send data along cables.
31
Wireless Networks
Wireless networks send data through the air using radio waves.
32
Bandwidth Compared
5G-250-500 bits per second (Mbps) 4G-20-100 Mbps Broadband-10-50 Mbps
33
What is faster download and upload
Your computer is receiving data, your computer is sending data through the internet...download
34