IT Security Flashcards

1
Q

Awareness in ICT

A
  • Internet and email are useful tools but we must be aware of how they can be at risk from attack from other users with hostile intent.
  • Take steps to protect your computer hardware, systems and portable devices, your personal information and data.
  • Respect confidentiality of information, all companies should have a privacy policy to show you how to do this.
  • Also have a e-mail and internet use policy and health and safety guidelines to follow
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the advantages of an email?

A
  • Mail is delivered within seconds rather than paying postage costs
  • Electronic can be simply attached to email messages
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the problems with emails?

A

-Some virus software/firewalls may prevent certain types of attachments from being sent via email (as some viruses are spread by being attached to e-mail messages)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attachment cant be attached to an email?

A

-Thos which contain macros passing through

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is netiquette?

A

-Network etiquette

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the rules of netiquette?

A
  • Always be accurate and keep your messages brief and relevant
  • Use brief subjects
  • Don’t send heated messages (flames)
  • Don’t use uppercase–same as shouting
  • Messages are spelled correctly
  • Not overdo use of colour and fonts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rules when sending sensitive information in an email

A
  • Must obey by the E-mail policy in a workplace
  • No circulation of inappropriate or offensive emails (joke or ‘chain mail’)
  • Only subject matter associated with the business should be sent
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of unwanted messages

A
  • Spam: masses of junk mail sent out by certain companies and individuals
  • Phishing: official-looking e-mails supposedly from banks, etc., asking you to confirm card details and/or PIN numbers. Delete them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to deal with spam?

A
  • Delete these emails (Outlook can do this automatically)

- Unsubscribe from their mailing list so no further messages will be sent to you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is identity theft a risk with using emails?

A
  • Receiving emails from unknown sources and following the instructions given to you (opening attached files or installing special software)
  • Any message that promises riches or rewards should be deleted immediately
  • Banks never will ask for password (phishing)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are hoax emails?

A

-Chain messages which are nuisances which adopt a fake virus warning format, offers of cash or chain emails which you need to forward to a specified number of people

Chain letters - requests to forward a message to lots of people,

Scams - unsupported claims that many other people have won prizes or cash

False alarms, misunderstandings, scares

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to spot a hoax message?

A
  • Requests to forward a message to a lot of people
  • Unsupported claim of other people winning prizes
  • Urgent emails “act now to protect against devastating viruses”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should you not do if you receive a hoax message?

A
  • Delete

- Don’t forward to anyone else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a computer virus?

A

-a piece of malicious software code introduced to a computer system OFTEN with the ability to spread itself to other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a bug?

A

-An error or fault in a piece of software code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a time bomb virus?

A

-a virus might lie dormant until a certain condition is met such a specific time/date (a time bomb)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a logic bomb virus?

A

-an operation such as deleting or copying files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a payload?

A

-The actions that a virus carries out when activated`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What can a computer virus do?

A

-can infect email programs and automatically send themselves to victims recipients, with no idea they spread the virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

When can a virus affect a computer or network?

A

-If introduced eternally and then activated i.e. Memory sticks, DVD’s, internet and email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How to prevent the risk of getting a computer virus?

A
  • Have anti-virus software installed on your computer
  • Allow it to automatically download updates
  • Download files only from reputable sources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Whats the problem with .exe file extensions?

A
  • These open and run executable

- If the file contains a virus, the virus will run with the program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are macro viruses?

A

-Those added to executable files within an application, most common within the template files in Microsoft Word and Excel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What to be wary of with documents containing macros?

A
  • Macros can be attached to excel and word files
  • Given option of opening files and templates with macros disabled-small scripts used to automate simple tasks-but can contain malicious code
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How to reduce risk of a computer virus with attached documents?

A

-Save attached files to disk and scan them with your antivirus software before opening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the different types of viruses?

A
  • Time bomb/logic bomb
  • Macro viruses
  • computer virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a worm?

A
  • Self-replicating computer program which uses a computer network to send copies of itself to other connected computers
  • It is an example of malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a trojan?

A
  • disguised as a link to a file that a user would be particularly tempted to open, e.g. a game or a graphics file.
  • Grants other people to your files without you knowing
  • Example of malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is malware?

A

-A form of unwanted software often with unwanted or malicious purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is adware?

A

-software package which automatically downloads advertisements to a computer after the software is installed on it or while the application is being used

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is spyware?

A
  • software installed without the user’s knowledge on their computer to interfere with their interaction with the computer, e.g., changing computer settings, interfering with Internet browsing, slowing down your connection.
  • Can gather personal information like internet browsing history or download additional internet software.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a rogue dialler?

A
  • a piece of software which affects dial up connections by deleting the internet service provider’s phone number and replacing it with a premium rate number.
  • Incur large phone costs every time they use the internet
  • Broadband not affected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is hacking?

A
  • changing computer software (or hardware) to do something other than what it was intended to do.
  • Thought to gain access to systems thought to be secure in order to access and steal data from them.
34
Q

Who is a hacker?

A

-a person who changes software (or hardware) from its intended use often for the purpose of infiltrating a system or by passing some form of security.

35
Q

How do hackers infiltrate a computer or system?

A
  • Hacking passwords
  • Infect a computer or system with a virus or trojan horse
  • Intercept and read communications such as email.
36
Q

Difference between a virus and malware?

A

fef

37
Q

What is a firewall?

A

-a filter that determines what type of traffic is allowed topass out of the system to the Internet, and into the system from the Internet. It helps to protect the computer from the risk of infiltration.

38
Q

Security precautions to avoid a security breach on your computer

A
  • Ensure a firewall is installed and running
  • Run latest software updates
  • Install a reliable anti-virus and anti-spyware software and keep them updated
  • Regular scans of the entire system with anti-virus and anti-spyware software
  • Use software to scan any removable disk before installing or opening files on it
  • Be aware of the source of any software you use!
  • Save any files downloaded from the Internet to the hard disk drive and scan them with anti-virus software before opening them.
  • Be aware of any e-mail messages containing attachments from an unknown source.
  • Even be suspicious of any e-mail messages from a known source!
39
Q

What is an anti-virus software?

A
  • Scans for viruses on the computer
  • Anti-virus program should be installed and updated regularly.
  • Be aware of the limitations of anti-virus software, as new viruses are created almost every day.
40
Q

What happens if AS software detects a virus?

A

-File is disinfected which means the file is identified and deleted

41
Q

What happens if AS detects a virus it can’t identify?

A
  • Offer to quarantine the file
  • This means that it will be moved to a secure location on the computer
  • It can be uploaded to the suppliers website or simply deleted by user
42
Q

What if a computer is infected with a virus?

A

-Disinfected and removed from network

43
Q

What is anti-spyware software?

A
  • Prevents spyware and adware from being installed on your computer, and keep your computer and personal information secure
  • Windows defender is an examples
  • Keep anti-spyware software up-to-date by installing the latest updates and perform a full scan of the system regularly.
44
Q

What is anti-spam software?

A

Spam mails are a used by many companies as a way of advertising.

Spam mails can be a way of introducing viruses to your computer.

Anti-spam software filters unwanted messages and is often included with anti-virus software.

45
Q

What is the role of passwords and pins?

A

-If the content of certain files is considered to be sensitive or confidential, then password protection should prevent unauthorised access, viewing or editing of data.

46
Q

Rules with passwords and pins

A
  • A strong password should consist of a combination of letters and numbers and be of an adequate length, i.e. at least 8 characters.
  • Change passwords regularly.
  • Do not share your password/PIN with others or write them down.
47
Q

What is a user ID?

A
  • An access code that provides evidence of a user’s entitlement to access certain areas of a network or system.
  • The password would also be used to identify the individual user.
48
Q

What are access rights?

A
  • different levels of access given by different user IDs

- Allows only appropriate personnel have access to the system and particularly to sensitive parts of the system

49
Q

What are the 3 process that are activated when a user logs on to a computer system?

A
  • Authentification
  • Identification
  • Authorisation
50
Q

What is authentication?

A

– finds out if someone is who they are saying they are by checking log on user passwords.

51
Q

What is identification?

A

-connects the information you have given in your user name and password and checks that it matches the details held for you

52
Q

What is authorisation?

A

-checks if you have the required permissions to access the content, after being authenticated and identified.

53
Q

How to change password using keys?

A

-ctrl, alt and delete

54
Q

How to change password using control panel?

A
  • Enter existing password first

- Enter new password and then re enter the password so it is entered correctly.

55
Q

What is identity theft?

A
  • Is the fraudulent use of your personal details by criminals such as opening a bank account for credit cards or mobile phones in your name.
    e. g. passports and driving licenses
56
Q

How to secure hardware?

A

-Use a security cable

57
Q

Security problem with portable devices

A

-Portable devices such as laptops, PDAs (personal digital assistants, e.g. IPhone, BlackBerry) are vulnerable to loss or theft because of their size

58
Q

Security problem with removable storage devices i.e. USB memory sticks

A

-especially if they contain sensitive, confidential or valuable information should be kept in safe an secure places as they are vulnerable to loss or theft.

59
Q

As PC memory is only temporary where should data be saved to?

A

-Hard disk or file server after regular short periods.

60
Q

What happens if power is lost while you are using a file>

A

-The data may become corrupted and unusable

61
Q

Where should backup media be kept?

A

-Kept in an environment that is theft-proof, fireproof and waterproof

62
Q

Cause of total file loss

A
  • hardware fault
  • physical damage to computer
  • infection by computer virus
  • accidental deletion
63
Q

How do businesses avoid file loss?

A

it is critical to carry out regular, complete copies of all files hourly, daily, weekly or whenever is considered necessary

-This is called backing up

64
Q

What is a backing store?

A
  • Storage containing the backup material
  • This is to ensure that files cannot be lost or completely destroyed while saved on hard drive or file server
  • Therefore keep backing store offsite
65
Q

Storage of personal information

A

-Make sure information is safely stored e.g. have a copy on the hard drive of the computer and backup on the CD ora memory stick.Also on secure locations on the internet

66
Q

Re-intallation of software

A

-keep original media where software is supplied ie. program CDs or DVDs in a secure place away from theft or any damage or risk

67
Q

How to secure computer when leaving it unattended

A
  • Locking it in a public service

- To do this press ctrl, alt, delete then on the security screen click lock.

68
Q

What is is a network?

A

Computers that are connected to each other

-Each computer on the network can see each other

69
Q

How is a computer identified on a network?

A

-Each computer has a unique IP (Internet Protocol) address or name

70
Q

What is a public network?

A
  • is a network anyone can connect to with very few barriers or protections enabled by default.
  • Anyone that connects is visible to any other machine and potentially accessible unless protection such as a firewall is in place.
  • The internet can be described a public network.
  • It can be described as unsecure.
71
Q

How to secure users from accessing public network?

A

-Use encrypted passwords to avoid access

72
Q

What to do when you send confidential information across a public network?

A

-Encrypt the data

73
Q

What is encryption?

A
  • The process of scrambling data into a form that can’t be easily understood by anyone not authorised to access it.
  • Based on the principle of a key locking (encrypting) the data and another key unlocking (decrypting) it.
74
Q

What is encryption and decryption collectively known as?

A

-Cryptography- which is the practice of hiding information.

75
Q

What is bluetooth connectivity?

A

-A way of connecting various devices, e.g. computers, phones, multimedia devices, and is wireless and automatic

76
Q

What is the rang between bluetooth devices?

A

-10 metres

77
Q

How many bluetooth devices can be connected at the same time?

A

-up to 8 devices

78
Q

Security with bluetooth devices

A
  • Bluetooth users can set up trusted devices that can exchange data without asking permission.
  • Bluetooth settings should be adjusted to prevent the risk of unauthorised access to a Bluetooth device by others.
  • Can be switched to ‘non-discoverable’ mode which will remain invisible to all untrusted bluetooth devices
79
Q

Where can windows built in firewall and defender be accessed?

A
  • Control panel
  • Good idea to check that both are active and running
  • Windows update settings can be accessed from the control panel which allow you to download updates that fix security problems. Download them often
80
Q

How to change internet security settings in internet explorer?

A

-select Tools | Internet Options and the Security tab.