Security of Data Flashcards

1
Q

Hacking

A

Illegal act of gaining unauthorized access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Effect of hacking

A

-Can lead to identity theft or misuse of data
-Data can be deleted. changed or corrupted on the users computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Solutions to Hacking

A

-Use of firewalls
-Use strong passwords and usernames
-Use anti-hacking software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

A legitimate looking email is sent out, the victim then opens the email. This redirect them to a website which has tricks them into giving out their personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Effect of phishing

A

-Can lead to identity theft and fraud
-Creator of the phishing attempt gain personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Solutions to Phishing

A

-Many websites or ISP provide email filter, this filters out spam and malicious emails
-Users should always be cautious before opening any attachments
-Users should prevent opening any attachments with end with exe, bat, php

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smishing

A

it uses the SMS systems to send a fake text message, these scams often contain a URL or a website link for the user to click on. It works the same way as phishing but instead the message is sent through mobile phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Vishing

A

It uses voicemail to trick the user into giving out personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A

The malicious code in embedded into the users computer or website, this will then redirect the user to a fake website without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Effect of pharming

A
  • can personal data
  • identity theft and fraud
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Solutions to pharming

A
  • certain anti-spyware is able to identify the malicious code and extract it
  • the user should be alert for clues that they are being redirected to another website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly