DTE Revision Flashcards
Keylogging
A type of surveillance technology used to monitor and record each keystroke on a specific device.
Sniffing
“Sniffing” is a process of monitoring and capturing all data packets passing through a given network
Metadata
Is data about data
Malware
Software that is specifically designed to disrupt, damage or gain unauthorized access to a computer system.
Hacking
Hacking is the act of compromising digital devices and networks through unauthorized access to an account or computer system
Computer network
A computer network is when two or more computers connect together which allows them to communicate
Protocols
All methods of communication need rules in place in order to pass on messages successfully. These sets of rules are called protocols.
Network hardware
There are a number of pieces of hardware that are needed in order to create a network. These include:
Network cable
Hub
Server
Router
WAP
Payload
Part of the message sent
Packets
Networks send and receive messages in small units of data known as “Packets”
Bandwidth
Bandwidth is the amount of data that can be moved from to another in a given time. Higher bandwidth = more data per second
Privacy policy
Privacy policy is a statement that explains in simple language how an organisation or agency handles your personal information.
Equifax
Equifax stores information on everyone who has a credit score. This information includes private datat like social security numbers and whether or not you pay your bills on time.
Encryption/Decryption
Encryption: The process of encoding a plain text message in some secret way is called encryption. The process that reverses encryption taking a secret message and reproducing the original plaintext, is called decryption.
Caesar Cipher
A technique for encryption that shifts the alphabet by some number of characters
Cipher
The generic term for a technique that performs encryption
Cracking encryption
When you attempt to decode a secret message without knowing all the specifics of the cipher
Random substitution cipher
Instead of just shifting the alphabet every letter is matched randomly to a different letter.
Single factor authentication
Something you know: Example password
Two factor authentication
Something you know: Example password and Something you possess: Example phone
Multifactor authentication
Something you know: Example password and Something you possess: Example phone and something you are: Example fingerprint
Multifactor authentication example
Examples of Multifactor Authentication:
Email codes
Text tokens
Biometric verification (such as fingerprint identification or facial recognition)
Hardware tokens
Security questions
Face ID
Digital footprint
A history of all the activity you do online things that contribute to it: Social media posts, websites you visit, any information you share online
Phishing
Phishing is a way cyber criminals can trick you into accessing your information