Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Define hacking

A

Hacking is the act of illegally gaining access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

effects/functions of hacking

A

Identity theft/fraud

Data could be deleted, changed or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ways to prevent hacking

A

Install firewalls
Very strong passwords
Antihacking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define spyware

A

Spyware is software that gathers information by monitoring key presses on keyboard. Information is sent back to person who coded the software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

effects / functions of spyware

A

Gives originator access to all data entered using keyboard

Able to install other spyware, read cookie data and change users default browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Solutions to spyware

A

Anti-spyware software

Using a mouse to select characters for passwords (dropdown box etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define viruses

A

Viruses are programs that replicate themselves with intentions of causing files/computers to be deleted/corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Functions/effects of viruses

A

Cause computer to crash/stop functioning
Can delete files/data
Can corrupt files/data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Solutions to viruses

A

Install anti-virus software

User should be carful when downloading files online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define pharming

A

Pharming occurs when a malicious code is installed on a user’s hard drive/webserver. This code redirects user to fake website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

functions/effects of pharming

A

Access to personal data

Identity theft/ fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Solutions to pharming

A

Anti-spyware
Look out for https
dont open suspicious things
look out for signs of redirection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define phishing

A

This is when a user receives a legit looking email with a link redirecting them to a bogus website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

functions/effects of phishing

A

Can gain personal data with website

Identity theft/fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solutions to phishing

A

User should be cautious

Way to filter out emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define wardriving

A

Act of locating and using wireless internet connections illegally

17
Q

functions/effects of wardriving

A

Possible to steal a user’s internet time

Possible to hack into wireless network and steal users passwords

18
Q

Solution to wardriving

A

Use of firewalls

Complex passwords

19
Q

What is a cookie

A

A cookie is a packet of data sent by a web server to a web browser. They are generated each time the user visits the website

20
Q

Some uses of cookies

A

Tracks customer preferences
Keeps cart for customer in online shopping sites
Tracks first time users and customers
Tracks wishlist

21
Q

What are the threats to data

A
Accidental damage( human error, power outage, accidentally deleting file)
Natural disasters (flood/fires/hurricanes)
Malicious actions (deliberate unauthorized actions
Data corruption( errors that occur during processing changing it)
22
Q

Solutions to threats to data

A

Saving regularly
Use of backups
Password protecting individual files
Training to avoid accidents

23
Q

What are firewalls

A

Firewalls are security systems designed to prevent unauthorized access to and from computer or private network

24
Q

Describe operation of firewall

A

It monitors ingoing and outgoing traffic
Firewall software contains dictionary of code from malwares
Firewall sits between computer and network
It analyses data and compares its code with set criteria
If it meets certain criteria it is allowed to enter
If it doesn not/ matches andy o the malware
It blocks or deletes it
Keeps a log of all the data that passes trough it/interacts with it

25
Q

Describe operation of proxy server

A

Acts as an intermediary between user and web browser
Using cache, speeds up access to website by storing pages at 1st visit
Acts similarly to firewall
Monitors ingoing and outgoing traffic
Can block requests from IP addresses

26
Q

Describe operation of DoS

A
It is designed to prevent users access to a website
Numerous requests sent to webs server
At the same time
Web server becomes flooded with traffic
Webserver cannot take it
Webserver crashes 
Website cannot be accesses
27
Q

Ways to guard against DoS attacks

A

Anti-malware, anti-virus
Setting up a firewall
Applying email filters