Security Flashcards
Define hacking
Hacking is the act of illegally gaining access to a computer system
effects/functions of hacking
Identity theft/fraud
Data could be deleted, changed or corrupted
Ways to prevent hacking
Install firewalls
Very strong passwords
Antihacking software
Define spyware
Spyware is software that gathers information by monitoring key presses on keyboard. Information is sent back to person who coded the software
effects / functions of spyware
Gives originator access to all data entered using keyboard
Able to install other spyware, read cookie data and change users default browser
Solutions to spyware
Anti-spyware software
Using a mouse to select characters for passwords (dropdown box etc)
Define viruses
Viruses are programs that replicate themselves with intentions of causing files/computers to be deleted/corrupted
Functions/effects of viruses
Cause computer to crash/stop functioning
Can delete files/data
Can corrupt files/data
Solutions to viruses
Install anti-virus software
User should be carful when downloading files online
Define pharming
Pharming occurs when a malicious code is installed on a user’s hard drive/webserver. This code redirects user to fake website
functions/effects of pharming
Access to personal data
Identity theft/ fraud
Solutions to pharming
Anti-spyware
Look out for https
dont open suspicious things
look out for signs of redirection
Define phishing
This is when a user receives a legit looking email with a link redirecting them to a bogus website
functions/effects of phishing
Can gain personal data with website
Identity theft/fraud
Solutions to phishing
User should be cautious
Way to filter out emails
Define wardriving
Act of locating and using wireless internet connections illegally
functions/effects of wardriving
Possible to steal a user’s internet time
Possible to hack into wireless network and steal users passwords
Solution to wardriving
Use of firewalls
Complex passwords
What is a cookie
A cookie is a packet of data sent by a web server to a web browser. They are generated each time the user visits the website
Some uses of cookies
Tracks customer preferences
Keeps cart for customer in online shopping sites
Tracks first time users and customers
Tracks wishlist
What are the threats to data
Accidental damage( human error, power outage, accidentally deleting file) Natural disasters (flood/fires/hurricanes) Malicious actions (deliberate unauthorized actions Data corruption( errors that occur during processing changing it)
Solutions to threats to data
Saving regularly
Use of backups
Password protecting individual files
Training to avoid accidents
What are firewalls
Firewalls are security systems designed to prevent unauthorized access to and from computer or private network
Describe operation of firewall
It monitors ingoing and outgoing traffic
Firewall software contains dictionary of code from malwares
Firewall sits between computer and network
It analyses data and compares its code with set criteria
If it meets certain criteria it is allowed to enter
If it doesn not/ matches andy o the malware
It blocks or deletes it
Keeps a log of all the data that passes trough it/interacts with it
Describe operation of proxy server
Acts as an intermediary between user and web browser
Using cache, speeds up access to website by storing pages at 1st visit
Acts similarly to firewall
Monitors ingoing and outgoing traffic
Can block requests from IP addresses
Describe operation of DoS
It is designed to prevent users access to a website Numerous requests sent to webs server At the same time Web server becomes flooded with traffic Webserver cannot take it Webserver crashes Website cannot be accesses
Ways to guard against DoS attacks
Anti-malware, anti-virus
Setting up a firewall
Applying email filters