Module 1.5 and 1.6 notes Flashcards

1
Q

Minimum specs

A
  • The bare requirements/basic capabilities your computer or device needs for a software or game to function
  • They are enough to run the progrsm/game but will not offer the best or most comfortable experience
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Recommended specs

A
  • The suggested system requirements that will get the best experience out of the software/game
  • Meeting the recommended specs means your computer will have the necessary capabilities to run and have impressive features like good graphics
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

EULA

A
  • A contract agreement between the application/software provider and the user that stipulates the conditions that the software is to be used
  • Dictates how it will be used, shared/modified, and installed
  • Stipulate user rights, limitations, intellectual property, warranty disclaimers, and consequences for violations
  • Installing the software means you accept the agreement

End User Licence Agreement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AUP

A
  • Broad-ranging guidelines and rules that monitor the responsible use of a platform or service
  • Will deal with issues such as harrassment, spam, and content restrictions
  • Consequences for violations could be content removal, account suspension, and sometimes legal action
  • Can be used by social media platforms, Internet Service Providers(ISP), webistes, or online communities

Acceptable User Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Social Engineering techniques

A
  • Pretexting- Creating a fabricating a scenario(pretending to be coworker) to gain trust in order to steal info
  • Baiting- Attacker offers something enticing(like free downlowad) in exchange for info or action that could benefit hacker
  • Tailgating- Physical social engineering when attacker follows authorised person to secure are and relying on their distraction or courtesy to access area
  • Quid Pro Quo- Attackers offer something in return for info
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Purposes of Malware

A
  • Data Theft- Stealing senistive info like passwords, credit card details, and personal files
  • System Disruption- Can cause disruptions, slowing down, or crashes in a computer
  • Remote Control- Can allow hacker unauthorised access where they can control infected device remotely
  • Financial gain- Ransomware for ie, encrypts a victim’s data then demands a ransom for them to decrypt it
  • Botnet- Hackers can infect a network of computers and control them like zombies for things like coordinated attacks on websites

Malware can spread through email attachments, websites, and downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly