SECURITY Flashcards
What are the three main privacy issues
• Accuracy relates to the responsibility of those
who collect data to ensure that the data is
correct.
• Property relates to who owns data.
• Access relates to the responsibility of those
who have data to control who is able to use
that data.
What is big data
extremely large data sets that may be analysed computationally to reveal patterns, trends, and associations, especially relating to human behaviour and interactions.
What are the important issues involved with large databases?
-Collecting public, but personally identifying,
information: What if people anywhere in the world
could view detailed images of you, your home, or
your vehicle?
-Spreading information without personal consent:
How would you feel if an employer were using your
social networking profiles to make decisions about
hiring, placement, promotion, and firing?
-Spreading inaccurate information: How would you
like to be turned down for a home loan because of an
error in your credit history?
What are examples of information stored by browsers?
history files (record sites visited) and
temporary Internet files or browser cache
(contain website content and display
instructions).
What is spyware?
a wide range of programs that are designed to
secretly record and report an individual’s activities on the Internet.
What is a keystroke logger
A type of computer-monitoring software which records every activity and
keystroke made on your computer system, including credit card
numbers, passwords, and e-mail messages.
How do you protect yourself from spyware?
exercise caution when visiting new websites and downloading
software from an unknown source. Another defense involves using
antispyware or spy removal programs, which are designed to detect
and remove various types of privacy threats.
What basic goals should computer security be built around?
• Confidentiality. Your data should be visible and accessible
only to those whom you choose to see it.
• Integrity. The data you see and store should be reliable and
accurate, and should not be tampered with. You need to be
able to trust this data.
• Availability. Your data should be accessible when you want
it, including after a mishap or disaster.
What is the CIA triad?
CIA stands for Confidentiality, Integrity, and Availability.
• Availability: the ability of a system to ensure that an asset can
be used by any authorized parties;
• • Integrity: the ability of a system to ensure that an asset is
modified only by authorized parties;
• Confidentiality: the ability of a system to ensure that an asset is
viewed only by authorized parties
Q1. Classify each of the following as a violation of confidentiality,
Of integrity, of availability or a combination:
(a). John copies Mary’s homework;
(b). Paul crashes Linda’s system;
(c). Gina forges Simon’s signature on a deed
(d). Henry spoofs Julie’s IP address to gain access to her computer.
Research
What is cybercrime?
Cybercrime or computer crime is any criminal offense
that involves a computer and a network.
• Cybercrimes can take various forms including the
creation of malicious programs, denial of service
attacks, rogue Wi-Fi hotspots, data manipulation,
identity theft, Internet scams, and cyberbullying.
What is a vulnerability, a threat and security?
A vulnerability is a weakness that could be exploited
to cause harm. A threat is a set of circumstances that
could cause harm. Security the state of being
protected from threats
What is hacking?
gaining access to a computer or network
without authorization. This may involve using
somebody else’s password or writing a program to break
another computer’s security software.
What is a cracker?
someone who exploits the weaknesses and
security holes that they find, with malicious intent.
What is ethical hacking?
g involves gaining access to a computer or
network with authorization from a company or
organization. The ethical hacker helps the company identify vulnerabilities