Grade 11 Term 1 Flashcards
What is the biggest threat to your computer?
HUMAN ERROR
Common errors made by people include:
● Giving sensitive information to the wrong people
● Writing down your passwords
● Using the same password for all your accounts
● Choosing an insecure password
● Clicking on links provided in emails without first verifying them.
What is the purpose of GIGO?
So if someone obtains your infomation and tries to use it, it would be incorrect. `
What is GIGO?
“Garbage In, Garbage Out”
What are ways to prevent people from getting physical access to your data?
● Do not leave your storage devices unattended in public spaces such as in school computers.
● Make regular backups of your data.
How can hardware faliure resultin data loss?
mechanical damages of hard drive
power failures
spilling coffee, and other water damages
Def. Trojan
A Trojan is a type of malware that is often disguised as useful software. Trojans can be used to gain
access to users’ systems. Users are tricked by social engineering executing the Trojan on their
system. Once activated, Trojans can enable cyber-criminals to gain backdoor access to your system.
One of the most dangerous types of trojan horses is called a keylogger, which recordskeystrokes.
Def. Virus
A computer virus is malicious software that is loaded onto a user’s computer without their knowledge, replicates itself and performs malicious actions.
Def. Phishing
Phishing attacks try to obtain sensitive information (such as usernames, passwords and banking
details) by sending emails to users that look like official emails. This is often used with email spoofing
to convince victims that they email is from a legitimate source.
Def. Worm
A computer worm is a type of malware that spreads copies of itself from one computer to another.
A worm can replicate itself without any action from the user and it does not need to attach itself to
another program to cause damage. Worms will scan a network for open ports and use those openings
to spread through the network.
Def. Rootkit
Rootkit is malware that is designed to infect a computer and allow an attacker to install a set of tools
that grant him remote access to the computer. The rootkit is hidden within the operating system and
will be designed to hide from anti-malware applications. Rootkits act as a backdoor that gives the
attacker the ability to connect remotely to the infected machine whenever he chooses and remove or
install specific components.
Def. Email Spoofing
With spoofing, the attacker disguises an email to pretend that the email is sent from a known, trusted
source. For example, the attacker might send emails that appear to come from you to your friends
and family with an urgent request for money while providing their own banking details.
Def. email Pharming
Pharming attacks create an official-looking website that requests sensitive information. A very
common pharming attack allows users to “change” their passwords. Instead of changing their
passwords, the user’s username and password is recorded and their account is taken over.
Pharming involves malicious code being is installed on a computer or server, which misdirects users
to a fraudulent website even when the type the correct address, that requests sensitive information
such as passwords and banking details which are then stolen by the cyber-criminal.
Def. Malware
Malicious software that is specifically designed to disrupt, damage, or gain unauthorised access to a computer system.
TYPES OF BACKUPS
FULL BACKUP
DIFFERENTIAL BACKUP
INCREMENTAL BACKUP
FULL BACKUP
A full backup is when a copy is made of every single file and folder in the system.
A full backup takes longer and uses more storage space than other types of
backups but restoring data from the backup is faster.
DIFFERENTIAL BACKUP
Differential backups start with a full backup and after that copies those files that
have been changed since the full backup took place.
UNINTERRUPTIBLE POWER SOURCE (UPS)
An uninterruptible power supply (UPS) is a device that allows a computer to keep
running for a short time when power is lost due to a power failure. UPS devices
also provide protection from power surges.
INCREMENTAL BACKUP
Incremental backups also start with a full backup. After that, a copy of the files
that have changed since the last backup is made, whether it was a full or
incremental copy.
LOCAL BACKUP
Local backups are made on a storage medium that is kept in the same location
as the original data. It could be on an external hard drive or Network Attached
Storage (NAS).
OFFSITE BACKUP
When the backup storage media is kept at a different location from the source,
this is known as an offsite backup.
How to make a hard PASSWORD
at least 8 characters
Use a mixture of both uppercase and lowercase letters
at least one special character
numbers
FIREWALL
A firewall is hardware, software or a combination of both, that monitors incoming
and outgoing traffic on a network. The firewall decides whether to stop the traffic
based on a set of predefined security rules. Its purpose is to create a barrier
between an internal network and incoming traffic from external sources to block
potentially malicious traffic.