security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is TCP

A

transfer control protocol - breaks up messages sent over the internet in to small chunks called packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is each packet given

A
header
the IP it is going to 
the IP address it has come from 
the sequence number of the packet
the number of packets in the whole communication.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

HTTP

A

hypertext transfer protocol - governs communication across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

HTTPS

A

hypertext transfer protocol secure- is a more secure version of HTTP, often used to handle financial transactions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

FTP

A

file transfer protocol - governs the transfer of files across the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SMTP

A

simple mail transfer protocol- handles email communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TCP/ IP

A

transfer control protocol / internet protoccol- handles communications on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

VoIP

A

Voice over internet protocol - handles audio/visual communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL

A

secure socket layer-a protocol which allows secure links between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TLS

A

transport layer security - a recent, more secure version of SSL.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is SSL used to secure

A

online credit crd transactions

any sensitive data exchanged online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

why do mobile phones need two MAC addresses

A

one for the wifi and one for the bluetooth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is meant by data losing its value

A

the more accurate and complete the data is, the more valuable it is. if the data is lost, corrupted or accidentally changed, it becomes less accurate and complete and loses value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is an automatic backup

A

is where a computer makes a backup without user intervention. is where the computer automatically creates a backup at a scheduled time and date.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

explain how anti-virus software may help to prevent DDos attacks

A

denial of service attacks occur when malware on a computer instructs the computer to send a high volume of requests to a server
antivirus software detects and removes malware from computers, removing the cause of the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

explain why computer security is more effective when anti-virus software and firewalls are used

A

malware is software designed to disrupt or modify a computer system
it is usually accidentally downloaded from mail attachments , websites and USB sticks.
antivirus software detects and removes malware from a computer, helping to keep the computer safe

17
Q

describe how a proxy server can help keep data safe

A

a proxy server is a computer that sits between a network server and the internet
the proxy server directs traffic away from the main server by examining the traffic
if the traffic is authorised it is forwarded to the network server; if not , the traffic is kept away from the network server keeping it and the data on it safe.

18
Q

what is the difference between symmetric and asymmetric encryption?

A

encryption converts data into a form that cannot be understood by anybody other than an authorised user.
encryption works by using a key
symmetric encryption uses the same key to encrypt and decrypt data
asymmetric encryption uses two separate keys which work as a pair
the first key is used encrypt the data
the second key is used to decrypt the data

19
Q

describe what a protocol is and how it helps protect data

A

a protocol is a set of rules that governs communications between computers
some protocols such as secure socket layer use asymmetric encryption to create a source link between one computer and another
this means that data can be safely transmitted between computers as anyone without the encryption keys cannot read the data

20
Q

how proxy servers prevent servers

A

proxy servers prevent direct access to the server. this is done by directing traffic to an intermediary server. the proxy server sits between the main server and the internet.

21
Q

what is the purpose of the proxy server

A

to direct traffic away from the network server. when a request comes in from the internet, the proxy server examines the request. if the request is thought to be valid , the corresponding data is retrieved from the network server and transmitted to the requesting computer. As a result, any attacks hit only the proxy server, not the network server itself.

22
Q

why can proxy servers can be beneficial

A

> if the data on a proxy server is lost, corrupted or changed the original data is still safe and secure on the network server.
a proxy server may hold certain data , but not sensitive data. an external computer can only access the data on the proxy server
as a proxy server can handle requests and transfer data, the network is free to handle requests from the computer on its own network speeding up internal access times.
proxy server can hold copies of frequently visited webpages. this speeds up access to those pages from computers on the network as the pages do not have to be downloaded from the internet.
can be used to prevent users from accessing external websites.
an organisation that receives large amounts of requests can use proxy servers to help spread the load.

23
Q

what is a firewall

A

is a security technology that monitors incoming and outgoing traffic. it provides a protective barrier between the computer and other computers.

24
Q

firewalls work through rules. 2 rules for the firewalls

A

only certain programs can be allowed to send and retrieve traffic

access to certain websites or servers can be blocked.

25
Q

what are the two types of firewall?

A

software firewall: protect an individual computer

hardware firewall: protects a network

26
Q

what are the disadvantage of firewalls

A

firewalls are very effective but because the user can modify the rules , unauthorised traffic still may occur.

27
Q

what are the 3 main types of backups

A

magnetic media
optical media
cloud storage

28
Q

what are worms

A

programs that do not delete or corrupt files like a virus. instead they replicate themselves over and over, filling a computers storage. this can cause a computer to run slowly or stop running all together

29
Q

what is a trojan horse

A

program that pretends to be other programs. when, they run they acting like viruses deleting and corrupting files.

30
Q

what is spyware

A

programs that collect personal data, then send it back to the spyware authors

31
Q

what is a server

A

a computer which handles requests from other computers

32
Q

what is a request

A

a communication which asks for data to be transferred

33
Q

what is authentification

A

security which prevents access to a computer even if the user has physical access

34
Q

how does antivirus software work

A

uses a list of malware called virus definitions and how they work. the software scans the computer and looks for any malware that it can recognise. if it finds any malware, the antivirus attempts to remove or blocks its access to the computer

35
Q

what is a brute force attack

A

generating every possible number combination in a key length and trying to decrypt its message