Network Issues and Prevention Flashcards

1
Q

What is Hacking?

A

Unauthorised access given to the computer. This can lead to identity theft or the misuse of personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Phishing?

A

Phishing involves getting sensitive information, such as usernames, passwords, and credit card details, for malicious reasons by mimicking a reliable webpage on the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Pharming?

A

This is malicious code installed on a user’s computer or a web server; the code will redirect the user to a fake website without their knowledge (the user doesn’t have to take any action, unlike phishing).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Viruses?

A

Program code that replicates (copies itself) to delete or corrupt files and cause the computer to malfunction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Password?

A

It is a common form of security often accompanied by a username or email address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How to enhance the security of a password?

A

Ensure that the password is changed regularly in case it has been obtained illegally or accidentally.

Ensure that the password uses a combination of uppercase, lowercase, numbers and special characters to make the password more difficult to guess.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Anti-spyware softwares?

A

Can be run regularly to ensure that your information, including your password, is not passed to an unauthorised third-party user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Zero login?

A

A security concept that eliminates traditional login methods, such as usernames and passwords, using biometrics or other authentication factors for seamless and password-less access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Biometric Recognition?

A

These authentication methods use unique physical or behavioural characteristics, such as fingerprints, iris scans, or voice recognition, to verify a person’s identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are Magnetic Stripes?

A

These are authentication features on cards storing data magnetically. They enable secure identification and authorization by containing encoded information that magnetic stripe readers can read.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are Smart Cards?

A

Smart cards are portable devices with integrated circuits to store and process data.

They are used for authentication, identification, and secure transactions in various applications such as banking, telecommunications, and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are Physical Tokens?

A

It is a type of authentication that takes the shape of a solid object.

The user demonstrates ownership of the token through interaction with a login system.

Physical tokens have embedded clocks that create one-time passwords (OTPs) when a PIN and other authentication information are entered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are Electronic Tokens?

A

Applications that users install on their hardware, such as smartphones.

Say a person wants to access a website on a tablet computer. To access this website, users must first authenticate themselves using electronic tokens. The user has already set up the electronic token app with their smartphone. The user launches the app on their smartphone when the website asks them to verify their identity. The program creates an OTP that is only good for a short period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Anti-malware Software?

A

Anti-malware software is designed to protect devices against viruses and malicious software.

Detects, prevents and removes malicious software.
It is installed onto a computer system and will operate in the background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Main purposes of Anti-malware software:

A

Comparing the scanned files against an extensive database of known threats.

Real-time scanning.

Regular updates to gather an up-to-date list of known threats.

Quarantine of infected files which allows threats to be automatically deleted. Allows the user to determine if the file is a legitimate threat and not a false positive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Heuristic Checking?

A

Instead of relying solely on a database of known viruses, this method looks for behavioural patterns and other features in a file to identify possible risks.