Revision Flashcards

1
Q

Front end

A

diretly interact with user, have some control
presentation layer, prioritise user experience
Client side, same across different platforms
Integrate with back end (sending/receiving data)

eg. shopping cart interface on e-commerce website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Back end

A

does not directly interact with user, behind the scenes/ logic layer

Include hardware and software, accounting budgeting, manufacturing, marketing, inventory management, order tracking and distribution

Server
* process front end request and respond

Database
* store, retrieve, manage data

Serverside logic
* buisness logic on how data should be processed and actions to perform

API (Application Programming Interface)
* allow front end to communicate with it
* handle request and respond

Programming Languages
* Python, Java, JavaScript

Middlewear
* bridge between front and back end
* data exchange, authentication, integration

Security
* Encrypt, validate, authentication and authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blockchain

A

digital records of transaction
records called blocks link together in a single list called chain
cryptographic hash links blocks, hence permanently records and hard to alter
each transaction validated by multiple computers

Peer to peer network, with no central authority.
Files shared directly without a central server
Only require internet and P2P Software= easy

record transaction made with cryptocurrencies
protect intellectual property, digital signature etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Type of Block chain

A

Public
* Open to anyone
* fully decentralised
* Secure but slow
* Example: BTC

Private
* Restricted to specific participants
* decentralised to organisation
* Higher Speed
* Example: SCM

Consortium
* Industries that need collaboration
* Decentralised to multiple organisation
* Balanced decentralisation and speed

Hybrid
* Combined Public and Private
* Adjustable decentralisation and speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Da

Data Mining

A

use mathemetical techniques to look for patterns or relationships in data
aid in decision making
Market Basket Analysis: those who bought that also bought this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Customer Relationship Management

A

help e-business manage customer base
match customer needs with products (personalisation
own inhouse personalization software or customised off the shelf software to meet information needs rather than just based on purchasing history
Operational CRM: Direct Customer interations
Analytical CRM; uses Operational CRM data to identify trends

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Supply Chain Management

A

Supply Chain Planning (SCP)
* Predict inventory levels based on resources

Supply Chain Execution (SCE)
* automate different actions in the supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Encryption

A

translaltion of data into a cipher text, where it is decrypted into plain text at the destination
require public key to encrypt, private key to decrypt

Public Key asymmetric and uses very large prime numbers
session keys are shorter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Data/Fund Transfer Safely

A

Encryption, Authentication, validation, blockchain, tunneling, SSL, vpn etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Physical Risks

A

Network Equipment and Physical Location
* Equipment and rooms always locked, location annonymous
* Fire suppression systems, train employees
* Substantial construction and design of facilities

Electrical Power Backup
* Two level: Batteries, Power Generators

Internet Connectivity Redundancy
* To have more than 1 connection to the internet
* complete data-centre redundancy to continue operation from different location

Outsourcing risks
* Web hosting services
* fee for service arrangement for power, connectivity, security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internal Security Risks

A

Unhappy employees, poor secuirty awarenes and planning

Passwords
Biometrics
Smart Card (embedded memory chip with user ID for authentication of remote user)
Backup and Restore Policies
Disaster Recovery Planning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

External Security

A

Bypass network defences
Hackers
Viruses
Website Defacement
DDOS
Counter by
Firewalls (packet fiiltering, circuit level, application level)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Transactional Security

A

Authentication
Integrity
Non repudiation (authencity of signature)
Confidentiaty

Security Protocols
Encryption
Public Keys
VPN
Tunneling
WAP
WTLS
WLANs
Security audit
penetrative testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Protocols

A

Secure Socket Layer (SSL) uses public key encryption and digital certificates
Transport Layer Security (TLS) assure no third party access to internet communications
Seure Electronic Transactions (SET) used for presenting credit card transaction on the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

VPN

A

private networks that use internet to transmit data
firewalls, public key encryption, digital certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tunneling

A

encapsulate one protocol witin another protocol

17
Q

WAP

A

Wireless Application Protocol
wap server send digital certificate & public key, client generates encrypted session key

18
Q

WTLS

A

Wireless Transport Layer Security
encryption and digital certificates

19
Q

WLANs

A

most vulnerable as hackers require few resoures

20
Q

Security audit

A

review policy, employee training and physical security

21
Q

penetrative testing

A

insurance, NDA, Scanning tools, Scope, Documentation

22
Q

Hackers

A
  • intruders that deliberately gain unauthorized access
  • most common=send confusing data
  • Crashing a program= take control of computers
  • Buffer overlow cause crashes
  • White hat: good hackers
  • Black hat: steal valuable information, disrupt service or damage
23
Q

Malware

A

· A short for “malicious software,” refers to any software designed to harm, exploit, or compromise the integrity of computers, networks, or devices.
· It is also used to steal data or inflict damage to computer or software systems.
· This includes viruses, worms, Trojan horses, and ransomware.

24
Q

Standard virus

A
  • small destructive programs inserted to other files
  • erase files/hardrives, prevent from booting, saving, printing and send repetitive e-mail messages
  • spread via email, attachments or when infected program executes
  • Melissa 1999
25
Q

Macro Virus

A
  • Infect Macro (word/excel/removable drives)
26
Q

Trojan Horses

A
  • Maliciouse disguised as fun or useful
  • Steal passwords, plant destructive programs
  • Zeus 2007
27
Q

Ransomware

A

· Encrypts a victim’s files or locks them out of their system.

· A demand of a ransom from the hacker to the victim to restore access to the data or system.

· Can lead to financial and data loss if the ransom is not paid and backups are not available.

28
Q

AI Hallucination

A

AI model generates outputs that are factually incorrect while presenting them with high confidence as if they were true

when user upload malware package into AI, and is social engineered to be used as part of training data-> when other users use a similar prompt, AI suggested that malware package as an answer, where innocent users would download such malware

29
Q

Deepfake

A

face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information

30
Q

Denial of Service (DOS)

A

disable network using flood of useless traffic (Pings, email)
DDOSS -> multiple computers to attack network

31
Q

Payment Cards

A

Credit Cards (present spending limit based on credit limit)
Debit Cards (removes charge from cardholder account to seller bank)
Charge Cards (no preset spending limit)

32
Q

Adv & Disadv Payment Cards

A

Adv
fraud protection
worldwide acceptance
online transaction

Disadv
per transaction fee and monthly processing fee

33
Q

Electronic Cash

A

companies attempt for a value storage and exchange system

Concerns
Privacy, Security, Independence, Portability, Convenience

Characteristics
Spend only once, Annonymous, Convenience

Online: online bank involved in all transfers
Offiline: virtual wallet

34
Q

Adv & disadv of Electronic Cash

A

Adv
* more efficient
* less costly (distance and hardware no cost)
* no party require special authorization

Disadv
* No audit trail
* forgery
* “flop”

35
Q

Providing Security for Electronic Cash

A

Threat of prosecution

two part lock for annonymous security that signals when someone is double spending

attach a serial number for each transaction for tracing

36
Q

Electronic Wallets

A

Works like a charge card
Holds credit card, electronic cash, owner identification & contact

can be server side or client side

37
Q

Stored Value Cards

A

Cash Card, Ezlink card, Flash Card

elaborate smart card or simple plastic card with magnetic strip

38
Q

Smart Card

A

Ploastic card with embeded microcheap containing user information
100 times more info than magnetic strip

39
Q

Using E-cash

A
  1. Customer select e-cash as payment method
  2. confirm payment using stored balance or bank account
  3. E-commnerce platform send transaction detail to payment gateway
  4. gateway connects with e-cash provider
  5. provider verifiy balance and ensure valid payment
  6. Fraud checks and security validation performed
  7. If approved, e-cash deduct fund from account and transferred to vendor account
  8. venor receive payment, confirm receipt, and process order
  9. Customer gets payment notfication