Network Security Flashcards
What is a virus
Piece of code that can copy itself onto many documents
What can a virus do?
Corrupt and damage files
What is a worm?
It is a malware computer program that can replicate itself onto different computer. It uses a computer network to spread itself
How can malware be installed on your machine
By downloading suspicious files onto your computer
What is the main difference between a Trojan horse and a virus
Trojan horses have to rely on the user to download file unlike viruses
What are the different types of attacks that a computer can undergo?
Malware, spyware, key logging, online fraud, identity theft, DOS attacks and phishing
What are the damaging effects of malware
They can corrupt, delete, and attach themselves onto most things on a computer system
What is spyware
Software that lets a computer know what another computers activities are
What is key logging?
A surveillance software that has the capability to record every keystroke you make
What are the laws of computing
Data protection act
Computer misuse act
Copyright designs and patents act
What is the data protection act
Holds details about who holds information on members of public
Any person/business has to abide by this law if they hold any info about anyone
Data subject has right to:
Know what and why info is being held about them
Inspect info
Have incorrect info changed
Apply for compensation if incorrect info has caused distress
Exceptions apply eg doctor, police
What is the computer misuse act
Hacking
Blackmail
Credit card fraud
Electronic fraud
What is the copyright design and patents act
Most published material is protected by the copyright design and patents act
Copyright is infringed if you:
Copy work
Issue copies to public
Perform, show, play work in public
Broadcast the work or include it in something
How is keylogging installed
By family member or close friends
What does keylogging do
Tries to capture personal messages, passwords and credit card details