Security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is the name of the law put on about computers

A

Computer Misuse Act 1990

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the punishment of having unauthorized access to a computer system

A

Imprisonment for up to 6 months or a fine up to £5000

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The punishment for unauthorized access with intent to commit a further offense

A

Imprisonment for up to 5 years and/or an unlimited fine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does DoS attack stand for

A

Denial of Service Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a DoS Attack

A

Flooding a target with traffic or sending it information which triggers a crash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does a DoS attack cause on the target Performance wise

A

Slow performances or inability to access which causes disruption to the users and business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a DoS attack cause on the target Cost wise

A

Lost Revenue and cost to repair

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What types of fault does a DoS attack include

A

bandwidth consumption, resource starvation and Domain Name Service (DNS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the reasons for DoS attacks

A

Financial
Political
Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What types of data do Tracking Cookies Include

A

Browser information
User actions on a site
Browsing history
Purchases
Preferences
IP address
Geographical location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the uses of Tracking Cookies

A

To improve Browser experience and direct marketing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Implications of Tracking Cookies

A

The user may not be aware data is being collected and may be used for malicious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Encryption

A

Transforming Plain text into the form of ciphertext using a mathematical algorithm known as an encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are digital certificates used for

A

To verify if the person who is sending a message is who they say there are

To ensure that an electronic message or document is authentic(So no alterations has been made)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are public keys used for

A

To encrypt Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are private keys used for

A

To Decrypt Data