Module 1.5 and 1.6 notes Flashcards
1
Q
Minimum specs
A
- The bare requirements/basic capabilities your computer or device needs for a software or game to function
- They are enough to run the progrsm/game but will not offer the best or most comfortable experience
2
Q
Recommended specs
A
- The suggested system requirements that will get the best experience out of the software/game
- Meeting the recommended specs means your computer will have the necessary capabilities to run and have impressive features like good graphics
3
Q
EULA
A
- A contract agreement between the application/software provider and the user that stipulates the conditions that the software is to be used
- Dictates how it will be used, shared/modified, and installed
- Stipulate user rights, limitations, intellectual property, warranty disclaimers, and consequences for violations
- Installing the software means you accept the agreement
End User Licence Agreement
4
Q
AUP
A
- Broad-ranging guidelines and rules that monitor the responsible use of a platform or service
- Will deal with issues such as harrassment, spam, and content restrictions
- Consequences for violations could be content removal, account suspension, and sometimes legal action
- Can be used by social media platforms, Internet Service Providers(ISP), webistes, or online communities
Acceptable User Policy
5
Q
Social Engineering techniques
A
- Pretexting- Creating a fabricating a scenario(pretending to be coworker) to gain trust in order to steal info
- Baiting- Attacker offers something enticing(like free downlowad) in exchange for info or action that could benefit hacker
- Tailgating- Physical social engineering when attacker follows authorised person to secure are and relying on their distraction or courtesy to access area
- Quid Pro Quo- Attackers offer something in return for info
6
Q
Purposes of Malware
A
- Data Theft- Stealing senistive info like passwords, credit card details, and personal files
- System Disruption- Can cause disruptions, slowing down, or crashes in a computer
- Remote Control- Can allow hacker unauthorised access where they can control infected device remotely
- Financial gain- Ransomware for ie, encrypts a victim’s data then demands a ransom for them to decrypt it
- Botnet- Hackers can infect a network of computers and control them like zombies for things like coordinated attacks on websites
Malware can spread through email attachments, websites, and downloads