ICT Crime + Networking Flashcards
What are the two grouped methods for combating computer crime?
Physical methods and logical methods.
3 examples of physical methods for combating ICT crime?
Having some sort of security for the location of the computer (security guards outside room, lock on door, etc). Biometric measures, so scanning someones iris or fingerprints. Having the screen face away from the public (like in a reception)
What does a username do?
Uniquely identifies a user. They can be restricted from going on certain machines or at certain times. You can also track what the user is doing.
What is auditing?
It’s a method of looking over logs. Logs can be created for events that occur on the network: logging in, applications run, websites visited.
Why keep logs?
Software can be used to track logs. If the user starts logging on at different times of the day, for example, this change of habit might need investigation to see if it’s them logging on.
What is a firewall?
It’s hardware and/or software gate between networks. Used on computers that connect to the internet to prevent unauthorised access to the system.
What does encryption do, security wise?
It doesn’t prevent the data being stolen. It aims to prevent anyone who has the data being able to understand it without the key.
What are the two main types of networks?
Peer to peer and client-server.
What is a peer to peer network?
A network where all of the computers connected to it are of equal status. An example would be linking two home computers together. Any of the computers connected can provide printer or file-sharing resources.
What are 4 advantages of a peer to peer network?
There is no need to purchase an expensive server, normal computers can be used. Each user manages their own computer meaning a network manager is not required. It’s set up with a wizard, no technical knowledge is required. There is no reliance on a central server, so the network remains robust if it fails.
What are 3 disadvantages of a peer to peer network?
Each computer is fulfilling more than one role, this increases the load on the systems. The data can be stored on any computer, so there is no organisation to data storage. Security, anti virus protection and back ups are the responsibility of the individual users.
What is a client server network?
This has a powerful controlling computer: the server. This computer controls the peripherals (printers, back ups, etc) and the network security.
What are 4 advantages of a client server network?
Back up, security and anti virus protection are centralised. Shared date is centralised and organised. The user does not do any of the management of the computers. Network processing is done centrally, not at individual computers, freeing them to do what the user wants.
What are 3 disadvantages of a client server network?
The server and network operating system cost money. A network manager is required. There is a reliance on the central server, it it fails, no work can be done.
What is a computer that is not connected to any other computer?
Lonely… (Stand alone.)