Risks to Data and Personal Information Flashcards

1
Q

What is hacking?

A

Unauthorized access gained to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the effects of hacking?

A

Files copied/deleted/corrupted/edited, identity theft, exposure of a company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can hacking be prevented?

A

Having a firewall, strong passwords, protection software and a professional hacker to try and hack you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are viruses?

A

Programming codes which are installed and replicated on a computer system without the user’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the effects of viruses?

A

Slower performance, files lost/corrupted/deleted and stopping of production.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can viruses be prevented?

A

Updated antivirus software, not using software or USB from unkown sources and being careful when clicking links/downloading attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Software which monitors your use of the computer and which keys are pressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the effects of spyware?

A

Passwords found out and additional harmful software installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can spyware be prevented?

A

Anti spyware software and pointing device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A

A potential victim will receive an email which looks legitimate, but involves visiting a fake website and giving away personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the effects of phishing?

A

Personal details found out, fraud and identitfy theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can phishing be prevented?

A

Filter on your email account and double checking URLs and email addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is pharming?

A

Malicious code installed onto a web server which redirects users to a fake website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the effects of pharming?

A

Personal details found out, fraud and identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can pharming be prevented?

A

Double checking the URL and using anti spyware software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are smishing and vishing?

A

Users receive a fake SMS message saying they have won a prize (smishing), but are asked to call a premium phone number. Can use an audio to sound like a real person (vishing).

17
Q

What are the effects of smishing and vishing?

A

Personal details found out and loss of money.

18
Q

How can smishing and vishing be prevented?

A

Double checking SMS messages, checking the link of a website and contacting your bank if suspicious people are requesting details.

19
Q

What is spam email?

A

Emaill sent out from a mailing list and can be used to promote phishing scams or products.

20
Q

What are the effects of spam email?

A

Personal details found out and network may become slower or unresponsive.

21
Q

How can spam email be prevented?

A

Using a junk email filter, not signing up to mailing lists, not replying to spam emails and not giving away your email adress.

22
Q

What is credit card fraud?

A

When a user is tricked into giving away their personal and financial information.

23
Q

What are the effects of credit card fraud?

A

Unauthorised purchases can be made and money can be transferred out of the account.

24
Q

How can credit card fraud be prevented?

A

Strong password, ensuring secure connection, having updated anti spyware software and checking bank statement.

25
Q

What are biometrics?

A

Relies on unique human characteristics for identification.

26
Q

Are there any other ways of preventing risks to data and personal information?

A

Being aware of scams, reporting attempts of people trying to gain information and having a firewall.

27
Q

What is encryption?

A

Converts information into a form that is meaningless to anyone except holders of a ‘key’.

28
Q

What is Cloud?

A

An online storage medium used to backup files. Internet connection is required to access files.

29
Q

What are the risks of Cloud?

A

Data lost during routine backups, celebrity data hacked and concerns about the security of the building where servers are held.

30
Q

What are digital certificates?

A

Verify the identity of the sender and provides the receiver a chance to gove an encrypted response.

31
Q

What is Secure Socket Layer (SSL)?

A

A green padlock/S/company name in a URL shows that a website is secure.

32
Q

What is Captcha?

A

Tells humans and computers apart.

33
Q

What do full backups do?

A

Create a copy of all files.

34
Q

What do differential backups do?

A

Creates a copy of files that have been changed since the last full backup.

35
Q

What do incremental backups do?

A

Creates a copy of files that have been changed since the last full or incremental backup.

36
Q

What information is needed to make a payment?

A

Card number, expiry date, name on card and CSC/CVC code.

37
Q

What is near field communication (NFC)?

A

A payment method which doesn’t require a pin.