IT Security Flashcards
Awareness in ICT
- Internet and email are useful tools but we must be aware of how they can be at risk from attack from other users with hostile intent.
- Take steps to protect your computer hardware, systems and portable devices, your personal information and data.
- Respect confidentiality of information, all companies should have a privacy policy to show you how to do this.
- Also have a e-mail and internet use policy and health and safety guidelines to follow
What are the advantages of an email?
- Mail is delivered within seconds rather than paying postage costs
- Electronic can be simply attached to email messages
What are the problems with emails?
-Some virus software/firewalls may prevent certain types of attachments from being sent via email (as some viruses are spread by being attached to e-mail messages)
What type of attachment cant be attached to an email?
-Thos which contain macros passing through
What is netiquette?
-Network etiquette
What are the rules of netiquette?
- Always be accurate and keep your messages brief and relevant
- Use brief subjects
- Don’t send heated messages (flames)
- Don’t use uppercase–same as shouting
- Messages are spelled correctly
- Not overdo use of colour and fonts
Rules when sending sensitive information in an email
- Must obey by the E-mail policy in a workplace
- No circulation of inappropriate or offensive emails (joke or ‘chain mail’)
- Only subject matter associated with the business should be sent
Types of unwanted messages
- Spam: masses of junk mail sent out by certain companies and individuals
- Phishing: official-looking e-mails supposedly from banks, etc., asking you to confirm card details and/or PIN numbers. Delete them
How to deal with spam?
- Delete these emails (Outlook can do this automatically)
- Unsubscribe from their mailing list so no further messages will be sent to you
How is identity theft a risk with using emails?
- Receiving emails from unknown sources and following the instructions given to you (opening attached files or installing special software)
- Any message that promises riches or rewards should be deleted immediately
- Banks never will ask for password (phishing)
What are hoax emails?
-Chain messages which are nuisances which adopt a fake virus warning format, offers of cash or chain emails which you need to forward to a specified number of people
Chain letters - requests to forward a message to lots of people,
Scams - unsupported claims that many other people have won prizes or cash
False alarms, misunderstandings, scares
How to spot a hoax message?
- Requests to forward a message to a lot of people
- Unsupported claim of other people winning prizes
- Urgent emails “act now to protect against devastating viruses”
What should you not do if you receive a hoax message?
- Delete
- Don’t forward to anyone else
What is a computer virus?
-a piece of malicious software code introduced to a computer system OFTEN with the ability to spread itself to other computers.
What is a bug?
-An error or fault in a piece of software code
What is a time bomb virus?
-a virus might lie dormant until a certain condition is met such a specific time/date (a time bomb)
What is a logic bomb virus?
-an operation such as deleting or copying files
What is a payload?
-The actions that a virus carries out when activated`
What can a computer virus do?
-can infect email programs and automatically send themselves to victims recipients, with no idea they spread the virus
When can a virus affect a computer or network?
-If introduced eternally and then activated i.e. Memory sticks, DVD’s, internet and email
How to prevent the risk of getting a computer virus?
- Have anti-virus software installed on your computer
- Allow it to automatically download updates
- Download files only from reputable sources
Whats the problem with .exe file extensions?
- These open and run executable
- If the file contains a virus, the virus will run with the program
What are macro viruses?
-Those added to executable files within an application, most common within the template files in Microsoft Word and Excel.
What to be wary of with documents containing macros?
- Macros can be attached to excel and word files
- Given option of opening files and templates with macros disabled-small scripts used to automate simple tasks-but can contain malicious code
How to reduce risk of a computer virus with attached documents?
-Save attached files to disk and scan them with your antivirus software before opening
What are the different types of viruses?
- Time bomb/logic bomb
- Macro viruses
- computer virus
What is a worm?
- Self-replicating computer program which uses a computer network to send copies of itself to other connected computers
- It is an example of malware
What is a trojan?
- disguised as a link to a file that a user would be particularly tempted to open, e.g. a game or a graphics file.
- Grants other people to your files without you knowing
- Example of malware
What is malware?
-A form of unwanted software often with unwanted or malicious purpose.
What is adware?
-software package which automatically downloads advertisements to a computer after the software is installed on it or while the application is being used
What is spyware?
- software installed without the user’s knowledge on their computer to interfere with their interaction with the computer, e.g., changing computer settings, interfering with Internet browsing, slowing down your connection.
- Can gather personal information like internet browsing history or download additional internet software.
What is a rogue dialler?
- a piece of software which affects dial up connections by deleting the internet service provider’s phone number and replacing it with a premium rate number.
- Incur large phone costs every time they use the internet
- Broadband not affected