ICT Crime + Networking Flashcards

1
Q

What are the two grouped methods for combating computer crime?

A

Physical methods and logical methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 examples of physical methods for combating ICT crime?

A

Having some sort of security for the location of the computer (security guards outside room, lock on door, etc). Biometric measures, so scanning someones iris or fingerprints. Having the screen face away from the public (like in a reception)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does a username do?

A

Uniquely identifies a user. They can be restricted from going on certain machines or at certain times. You can also track what the user is doing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is auditing?

A

It’s a method of looking over logs. Logs can be created for events that occur on the network: logging in, applications run, websites visited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why keep logs?

A

Software can be used to track logs. If the user starts logging on at different times of the day, for example, this change of habit might need investigation to see if it’s them logging on.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a firewall?

A

It’s hardware and/or software gate between networks. Used on computers that connect to the internet to prevent unauthorised access to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does encryption do, security wise?

A

It doesn’t prevent the data being stolen. It aims to prevent anyone who has the data being able to understand it without the key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the two main types of networks?

A

Peer to peer and client-server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a peer to peer network?

A

A network where all of the computers connected to it are of equal status. An example would be linking two home computers together. Any of the computers connected can provide printer or file-sharing resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 4 advantages of a peer to peer network?

A

There is no need to purchase an expensive server, normal computers can be used. Each user manages their own computer meaning a network manager is not required. It’s set up with a wizard, no technical knowledge is required. There is no reliance on a central server, so the network remains robust if it fails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 3 disadvantages of a peer to peer network?

A

Each computer is fulfilling more than one role, this increases the load on the systems. The data can be stored on any computer, so there is no organisation to data storage. Security, anti virus protection and back ups are the responsibility of the individual users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a client server network?

A

This has a powerful controlling computer: the server. This computer controls the peripherals (printers, back ups, etc) and the network security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 4 advantages of a client server network?

A

Back up, security and anti virus protection are centralised. Shared date is centralised and organised. The user does not do any of the management of the computers. Network processing is done centrally, not at individual computers, freeing them to do what the user wants.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are 3 disadvantages of a client server network?

A

The server and network operating system cost money. A network manager is required. There is a reliance on the central server, it it fails, no work can be done.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a computer that is not connected to any other computer?

A

Lonely… (Stand alone.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

NOTE:

A

The advantages of a stand alone computer are the disadvantages of a network and vice versa.

17
Q

What are the advantages of networking?

A

Peripherals, such as printers and scanners can be shared by several workstations, reducing the cost (you don’t have to buy one for each). Data can be shared, this allows standard files such as templates to be available from a central source, a team can all also work on the same document. Access to data is controlled by usernames and passwords, the network manager can log who’s used what. Back ups and virus checking can be controlled from a central location.

18
Q

What are the disadvantages of networking?

A

All the services it provides can become unavailable if the network fails. The devices that are required to build the network can be expensive. If a virus is introduced onto a single computer, it can spread to more via the network. If the network is busy, it may run slow for all of the users.

19
Q

What is a protocol?

A

In order for the computers to communicate they need to be talking the same language. This means that they need to be running the same protocol or standard.

20
Q

What is an example of a protocol?

A

TCP/IP

21
Q

What are the 5 things a protocol governs?

A

The format of the message. The type of error checking to be used. Any compression. How the sending device indicates it has finished sending. How the receiving device indicated that it has received the message.