Network Issues and Prevention Flashcards
What is Hacking?
Unauthorised access given to the computer. This can lead to identity theft or the misuse of personal information.
What is Phishing?
Phishing involves getting sensitive information, such as usernames, passwords, and credit card details, for malicious reasons by mimicking a reliable webpage on the network
What is Pharming?
This is malicious code installed on a user’s computer or a web server; the code will redirect the user to a fake website without their knowledge (the user doesn’t have to take any action, unlike phishing).
What are Viruses?
Program code that replicates (copies itself) to delete or corrupt files and cause the computer to malfunction.
What is a Password?
It is a common form of security often accompanied by a username or email address.
How to enhance the security of a password?
Ensure that the password is changed regularly in case it has been obtained illegally or accidentally.
Ensure that the password uses a combination of uppercase, lowercase, numbers and special characters to make the password more difficult to guess.
What are Anti-spyware softwares?
Can be run regularly to ensure that your information, including your password, is not passed to an unauthorised third-party user.
What is Zero login?
A security concept that eliminates traditional login methods, such as usernames and passwords, using biometrics or other authentication factors for seamless and password-less access.
What is Biometric Recognition?
These authentication methods use unique physical or behavioural characteristics, such as fingerprints, iris scans, or voice recognition, to verify a person’s identity.
What are Magnetic Stripes?
These are authentication features on cards storing data magnetically. They enable secure identification and authorization by containing encoded information that magnetic stripe readers can read.
What are Smart Cards?
Smart cards are portable devices with integrated circuits to store and process data.
They are used for authentication, identification, and secure transactions in various applications such as banking, telecommunications, and access control.
What are Physical Tokens?
It is a type of authentication that takes the shape of a solid object.
The user demonstrates ownership of the token through interaction with a login system.
Physical tokens have embedded clocks that create one-time passwords (OTPs) when a PIN and other authentication information are entered.
What are Electronic Tokens?
Applications that users install on their hardware, such as smartphones.
Say a person wants to access a website on a tablet computer. To access this website, users must first authenticate themselves using electronic tokens. The user has already set up the electronic token app with their smartphone. The user launches the app on their smartphone when the website asks them to verify their identity. The program creates an OTP that is only good for a short period of time.
What is Anti-malware Software?
Anti-malware software is designed to protect devices against viruses and malicious software.
Detects, prevents and removes malicious software.
It is installed onto a computer system and will operate in the background.
Main purposes of Anti-malware software:
Comparing the scanned files against an extensive database of known threats.
Real-time scanning.
Regular updates to gather an up-to-date list of known threats.
Quarantine of infected files which allows threats to be automatically deleted. Allows the user to determine if the file is a legitimate threat and not a false positive.