Network Security Flashcards
What is a virus
Piece of code that can copy itself onto many documents
What can a virus do?
Corrupt and damage files
What is a worm?
It is a malware computer program that can replicate itself onto different computer. It uses a computer network to spread itself
How can malware be installed on your machine
By downloading suspicious files onto your computer
What is the main difference between a Trojan horse and a virus
Trojan horses have to rely on the user to download file unlike viruses
What are the different types of attacks that a computer can undergo?
Malware, spyware, key logging, online fraud, identity theft, DOS attacks and phishing
What are the damaging effects of malware
They can corrupt, delete, and attach themselves onto most things on a computer system
What is spyware
Software that lets a computer know what another computers activities are
What is key logging?
A surveillance software that has the capability to record every keystroke you make
What are the laws of computing
Data protection act
Computer misuse act
Copyright designs and patents act
What is the data protection act
Holds details about who holds information on members of public
Any person/business has to abide by this law if they hold any info about anyone
Data subject has right to:
Know what and why info is being held about them
Inspect info
Have incorrect info changed
Apply for compensation if incorrect info has caused distress
Exceptions apply eg doctor, police
What is the computer misuse act
Hacking
Blackmail
Credit card fraud
Electronic fraud
What is the copyright design and patents act
Most published material is protected by the copyright design and patents act
Copyright is infringed if you:
Copy work
Issue copies to public
Perform, show, play work in public
Broadcast the work or include it in something
How is keylogging installed
By family member or close friends
What does keylogging do
Tries to capture personal messages, passwords and credit card details
What is phishing
Fraudulent practice of sending emails purporting to be from reputable companies In order to reveal personal info
How can you tell if an email is a phishing email
If you hover over the email then you can see if it’s from someone you know or don’t know
If there are many spelling errors
If there isn’t an equal amount of text and images
How can you prevent data loss from phishing
By making sure that you have updated to the newest OS
How can you protect your computer from malware
Firewalls, spyware protection, shred documents that contain personal info and use secure passwords
What is a DOS attack
Denial of Service attack
Brings down server by overloading network with unwanted traffic causing it to crash
What is encryption
Changing personal data into unreadable format so that no one can see their data
What is an encryption key
Key used to figure out encryption