SECURITY Flashcards

1
Q

What are the three main privacy issues

A

• Accuracy relates to the responsibility of those
who collect data to ensure that the data is
correct.
• Property relates to who owns data.
• Access relates to the responsibility of those
who have data to control who is able to use
that data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is big data

A

extremely large data sets that may be analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the important issues involved with large databases?

A

-Collecting public, but personally identifying,
information: What if people anywhere in the world
could view detailed images of you, your home, or
your vehicle?
-Spreading information without personal consent:
How would you feel if an employer were using your
social networking profiles to make decisions about
hiring, placement, promotion, and firing?
-Spreading inaccurate information: How would you
like to be turned down for a home loan because of an
error in your credit history?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are examples of information stored by browsers?

A

history files (record sites visited) and
temporary Internet files or browser cache
(contain website content and display
instructions).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is spyware?

A

a wide range of programs that are designed to

secretly record and report an individual’s activities on the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a keystroke logger

A

A type of computer-monitoring software which records every activity and
keystroke made on your computer system, including credit card
numbers, passwords, and e-mail messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How do you protect yourself from spyware?

A

exercise caution when visiting new websites and downloading
software from an unknown source. Another defense involves using
antispyware or spy removal programs, which are designed to detect
and remove various types of privacy threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What basic goals should computer security be built around?

A

• Confidentiality. Your data should be visible and accessible
only to those whom you choose to see it.
• Integrity. The data you see and store should be reliable and
accurate, and should not be tampered with. You need to be
able to trust this data.
• Availability. Your data should be accessible when you want
it, including after a mishap or disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the CIA triad?

A

CIA stands for Confidentiality, Integrity, and Availability.
• Availability: the ability of a system to ensure that an asset can
be used by any authorized parties;
• • Integrity: the ability of a system to ensure that an asset is
modified only by authorized parties;
• Confidentiality: the ability of a system to ensure that an asset is
viewed only by authorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Q1. Classify each of the following as a violation of confidentiality,
Of integrity, of availability or a combination:
(a). John copies Mary’s homework;
(b). Paul crashes Linda’s system;
(c). Gina forges Simon’s signature on a deed
(d). Henry spoofs Julie’s IP address to gain access to her computer.

A

Research

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is cybercrime?

A

Cybercrime or computer crime is any criminal offense
that involves a computer and a network.
• Cybercrimes can take various forms including the
creation of malicious programs, denial of service
attacks, rogue Wi-Fi hotspots, data manipulation,
identity theft, Internet scams, and cyberbullying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a vulnerability, a threat and security?

A

A vulnerability is a weakness that could be exploited
to cause harm. A threat is a set of circumstances that
could cause harm. Security the state of being
protected from threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is hacking?

A

gaining access to a computer or network
without authorization. This may involve using
somebody else’s password or writing a program to break
another computer’s security software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a cracker?

A

someone who exploits the weaknesses and

security holes that they find, with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ethical hacking?

A

g involves gaining access to a computer or
network with authorization from a company or
organization. The ethical hacker helps the company identify vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are malicious programs

A

These programs are called malware, which
is short for malicious software. They are
specifically designed to damage or disrupt
a computer system.

17
Q

What are the most common types of malware?

A

– viruses,
– worms, and
– Trojan horses.

18
Q

What are viruses?

A

programs that migrate through
networks and operating systems, and most attach themselves to different programs and databases. • Once activated, these destructive viruses can alter and/or delete files.

19
Q

Examples of services that keep track of viruses

A

Symantec, McAfee, and Microsoft

20
Q

What are worms?

A

programs that simply replicate
themselves over and over again. Once active in a
network, the self-replicating activity clogs
computers and networks until their operations are
slowed or stopped.

21
Q

What is a trojan horse?

A

a piece of software, such as a game
or utility, that may appear harmless but has a
malicious purpose. Typically, the user knowingly
installs the game or utility, but doesn’t realize
there’s a Trojan inside. When the user runs the
program, the Trojan starts running in the
background, often without the user’s knowledge.

22
Q

What is adware?

A
a software application that
automatically displays advertising banners
while the program is running. The
programmers of these software
applications include additional code that
displays advertisements in pop-up
windows or in a bar on the computer
screen.
23
Q

What is an anti-virus?

A

a program which protects
the computer system against most viruses.
Typically, such programs detect the presence of
viruses in a computer and in most cases remove
(or disinfect) any files infected by viruses

24
Q

What is a denial of service (DoS) attack

A

It attempts to slow down or stop a computer system or
network by flooding a computer or network with
requests for information and data. The targets of these
attacks are usually Internet service providers (ISPs) and
specific websites.

25
Q

What are rogue Wi-Fi Hotspots?

A

Some wireless networks appear
to be genuine, but in fact attempt to intercept your
traffic. These types of Wi-Fi networks are called rogue
Wi-Fi. These Wi-Fi networks usually seem authentic,
often with a name that is similar or the same as a
legitimate network. Once connected, the rogue
networks capture any or all information sent by the
users to legitimate sites including usernames and
passwords.