IT Comp 3 Exam Flashcards
Ad-hoc
Something that is setup when and where needed.
Ad-hoc Network
A network that is setup when and where needed. They are often created using a mobile device like a smartphone, and can be used wirelessly or using a cable.
USB Tethering
Where a cable is used to create an ad-hoc network
Mobile Hotspot
Where Wi-Fi or Bluetooth is used to create an ad-hoc network
Advantages of USB Tethering
Connection speed is quicker, Is a wired connection, Does not require a wireless connection, Uses less battery than a Mobile Hotspot
Advantages of Mobile Hotspots
Is a wireless connection, Host and device both need wireless capabilites, More than one device can connect at a time
Open Network
A Wi-Fi Network that does not encrypt data. Anyone can intercept information sent via the network (i.e. passwords and personal data). Hackers can also connect to your device.
How can a user protect themselves on an Open Network?
Use an up-to-date firewall and a VPN
VPN
A VPN (or Virtual Private Network) encrypts your network traffic by ‘tunneling’ you to another network (often in different countries). These can reduce the risk of personal data being stolen on an Open Network
Issues with Ad-hoc Networks
Battery life of the host will reduce very quickly, If your hotspot is open, anyone can connect, Monthly/top-up data from your mobile plan is used. In most cases, there is not an unlimited amount., Signal strength, and network speed can fluctuate due to it being on a mobile network.
What could prevent your host from recieving a mobile network’s signal?
The microwave link could not have enough range, or be blocked by a building or hill
Cloud Storage
Where a company hosts a service (like Microsoft OneDrive or Dropbox) to store your files on a remote server via the internet.
Cloud Computing
Where a company hosts a service (like Microsoft 365 or Google Drive) to store your files on a remote server via the internet.
Advantages of Cloud Storage
File versioning, Automatic synchronisation, Data backups, Security, Scalability
File Versioning
Where older versions of a file are stored on Cloud Storage in case of accidental deletion or a user wanting to retrieve an older version for reference/to compare.
Data Backups
Where full or incremental/partial backups of a computer system are made and uploaded to Cloud Storage.
Automatic Synchronisation
Where files are automatically synced to Cloud Storage so that the user can share files and collaborate in real-time with other users.
Security
Cloud Storage is significantly more secure than Local Storage. In most cases, Local Storage is almost always unencrypted and can be physically stolen, whereas Cloud Storage is one of the most protected forms of storage (i.e. physically protected and protected with two-factor authentication)
Scalability
While traditional mediums of storage, like Local Storage, require drives to be physically added to a system, upgrading the tier of your Cloud Storage service will instantaniously give you more storage.
Advantages of Cloud Computing
Devices can have small storage drives, so are cheaper (used as Thin Clients), More than one person can collaborate on a document at a time, Changes are saved automatically to files
SaaS
SaaS (Software as a Service) describes Cloud Computing that is a paid for service.
Choosing a Cloud service
Users/Network Administrators look for lots of things when selecting an online platform, including; * Security of data * Compatibility with existing infrastructure * System Maintainance needed * Speed of setup * Internet Speed Requirements
Disaster Recovery
The plan to recover data after a loss of data (i.e. cyber attack or physical damage)
World Teams
People can communicate from all over the world, and that means that they can also work from all over the world using technologies like; * E-Mail * Video Confrencing * Instant Messaging
Advantages of World Teams
Workers from all over the world can keep in touch, Companies can employ the best from anywhere
Disadvantages of World Teams
People may not be avaliable due to living in different time zones, World teams could have an impact on work-life balances.
Stakeholder
Somebody who has an interest in a business or organisation (i.e. employees, shareholders, local community)
Communication Channels
A way that an organisation can communicate with stakeholders, using; * Webpages * Social Media * E-Mail
The Equality Act 2010
The law in the UK which recognises disabilies are protected by a discriminatory law.
Interface Design
For interfaces to be accessible to anyone, they need to have a good; * Layout * Font * Colour Selection
Types of Hardware Accessibility Devices
Puff Switch, Foot Mouse, Eye Typer, Braille Keyboard
Types of Software Accessibility Devices
magnifier, high contrast, keyboard shortcuts, screen readers
Infrastructure
The physical systems and structures that are in place for an organisation
How could not having a ¯¯¯¯¯¯¯ impact a modern business?
Website - reduces the amount of advertising a company can recieve, Mobile Optimised Website - reduces the amount of advertising a company can recieve, Superfast Broadband Connection - reduces the amount of advertising a company can recieve.
Hacking
Unauthorised access to a computer system. Covered by the Computer Misuse Act 1990
Why are systems attacked?
Fun, financial gain, industrial espionage, personal attacks, hacktivism (hacking for activism)
Types of Hackers
Black Hat - a hacker with malicious intent, Grey Hat - a hacker with neither malicious or heroic intent, White Hat - a hacker with heroic intent to stop other hackers
Types of threat to a computer system
Unauthorised access, virus, worm, botnet/DDoS attack, rootkit, trojan, ransomware, spyware
Virus
A computer program or part of a computer program that can make copies of itself and is intended to prevent the computer from working normally
Worm
a harmful computer program that can copy itself and spread across a number of connected computers
Botnet
A group of computers that are controlled by software containing harmful programs, without their users’ knowledge
DDoS
Distributed Denial of Service: an occasion when a computer network or website is intentionally prevented from working correctly, by a botnet sending lots of data at once.
Rootkit
A type of malware designed to give hackers access to and control over a target device. Most rootkits affect the software and the operating system.
Trojan
A computer program that has been deliberately designed to destroy information, or allow someone to steal it.
Ransomware
Software designed by criminals to prevent computer users from getting access to their own computer system or files unless they pay money.
Spyware
Software that collects information about how someone uses the internet, or personal information such as passwords, without the user knowing about it
Social Engineering
Manipulating people so that confidential information can be found out.
Why does social engineering work?
Most people want to do the right thing, and this is why it works. In a recent study, 60% of unauthorised USB drives were mounted to a computer and used in a controlled environment.
Types of Social Engineering
Phishing, pharming, shoulder surfing, tailgating, baiting, pretexting
Internal Threats
dodgy websites, portable storage, stealing/leaking data, disclosure of data, overriding security, downloads
Why do Internal Threats happen?
accidents or employee choosing to attack a business
impacts of an Internal Threat
short term (data loss/downtime, lost sales), long term (reputation damage, financial loss)
Firewall
set of rules that filter suspicous network packet from remote networks
Hardware Firewall
Sits between an external network and an internal connection - like a LAN and the internet - as a first line of defence.
Software Firewall
On a system - like a computer - to filter network data in and out. Secondary protection, which uses an ACL to block certain data.
Types of Device Hardening
security patches, anti-virus, firewalls, user permissions, closing ports, encryption
Digital Footprint
All the data you have shared makes up your digital footprint. Future employers and the government can look at this to make decisions about you (can be either active or passive)
Location Services
Location services track where you are using GPS, Wi-Fi, Bluetooth and phone towers.
Where aare location services used?
App-based taxi services, airports and railways, fitness trackers, location-based games, Law and order
Cookies
Session-based or persistant files stored on your computer that; * keep you logged in * or store your shopping bag * etc
Transactional Data
Data that is collected when a user exchanges information with a business, such as shopping with their loyalty card.
Environmental Issues
To create a computer, over 7,300 gallons of water is used, and that is an issue. Highly toxic chemicals like Arsenic, Cadium and Chromium are also used to create a computer.
Packaging & Distribution
Packaging for IT equiptment is often unrecyclable and end up in landfill. Devices usually also travel large distances from their factories in China and Taiwan across the planet to customers in other countries.
Device Usage
Keep devices cool uses a lot of energy too, and if this is not from renewable forms of energy, then it is speeding up the rate of Global Warming.
How to prevent environmental risks
Only upgrade devices when necessary, check power setting, don’t print if not needed, don’t leave devices on standby
Disposal
You must dispose of IT equiptment properly. The current legislation is the WEEE laws (Waste, Electrical and Electrical Equiptment Regulations 2013). You should; donate, recycle, refurbish or trade-in devices so that they can end up not going in landfill.
Digital Literacy
With IT equiptment becoming increasingly more important in society, digital literacy is important. Simple tasks like using a web browser and using a word processor should be essential nowadays.
Digital Divide
The gap between those with great technology skills and those with not.
Digital Exclusion
Where people cannot access important digital services.
Net Neutrality
The concept that all traffic online should be treated the same. Without Net Neutrality, Governments and Internet Service Providers (ISPs) can block access to certain sites.
Data Protection
More personal information is being stored on computers, and with that data becomes beig responsibilities. If the data were to be stolen, it could be a big risk. Protected by Data Protection Act 2018.
GDPR
General Data Protection Regulation 2016 of the European Union
Intellectual Property
Original designs, ideas and artwaork that is protected if you create it. If ownership is hard to prove, then a copyright, trademark or patent is put in place. Protected by the Copyright, Designs & Patents Act 1988
The Malicious Communications Act
A law that prevents people from posting malicious things on the internet. Sanctions can include 2 years of prison or a fine.
Flowchart
A visual representation of a workflow
Algortithm
A series of steps necessary to complete a task
Information Flow Diagram
Shows the flow of information between individuals or departments
Data Flow Diagram
Shows an Information Flow Diagram in much more detail (i.e how it will be processed, and how it is outputted)
Process
Something that is happening
Data Store
Where data is held
Entity
A person, department, or device which supplies or is provided with data and info.