Network Security Flashcards

1
Q

What is a virus

A

Piece of code that can copy itself onto many documents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can a virus do?

A

Corrupt and damage files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a worm?

A

It is a malware computer program that can replicate itself onto different computer. It uses a computer network to spread itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can malware be installed on your machine

A

By downloading suspicious files onto your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the main difference between a Trojan horse and a virus

A

Trojan horses have to rely on the user to download file unlike viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the different types of attacks that a computer can undergo?

A

Malware, spyware, key logging, online fraud, identity theft, DOS attacks and phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the damaging effects of malware

A

They can corrupt, delete, and attach themselves onto most things on a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is spyware

A

Software that lets a computer know what another computers activities are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is key logging?

A

A surveillance software that has the capability to record every keystroke you make

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the laws of computing

A

Data protection act
Computer misuse act
Copyright designs and patents act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the data protection act

A

Holds details about who holds information on members of public
Any person/business has to abide by this law if they hold any info about anyone
Data subject has right to:
Know what and why info is being held about them
Inspect info
Have incorrect info changed
Apply for compensation if incorrect info has caused distress

Exceptions apply eg doctor, police

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the computer misuse act

A

Hacking
Blackmail
Credit card fraud
Electronic fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the copyright design and patents act

A

Most published material is protected by the copyright design and patents act
Copyright is infringed if you:
Copy work
Issue copies to public
Perform, show, play work in public
Broadcast the work or include it in something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How is keylogging installed

A

By family member or close friends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does keylogging do

A

Tries to capture personal messages, passwords and credit card details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is phishing

A

Fraudulent practice of sending emails purporting to be from reputable companies In order to reveal personal info

17
Q

How can you tell if an email is a phishing email

A

If you hover over the email then you can see if it’s from someone you know or don’t know
If there are many spelling errors
If there isn’t an equal amount of text and images

18
Q

How can you prevent data loss from phishing

A

By making sure that you have updated to the newest OS

19
Q

How can you protect your computer from malware

A

Firewalls, spyware protection, shred documents that contain personal info and use secure passwords

20
Q

What is a DOS attack

A

Denial of Service attack

Brings down server by overloading network with unwanted traffic causing it to crash

21
Q

What is encryption

A

Changing personal data into unreadable format so that no one can see their data

22
Q

What is an encryption key

A

Key used to figure out encryption