Social Implications Of Computer Networks Flashcards
How does authentication work
What is an acceptable use policy
Compare your schools acceptable use policy with the list of guidelines given above. Make a suggestion on how to improve your school’s AUP
What are the main concerns with BYOD policies in the workplace
How can companies avoid security and usage issues in a BYOD environment
Name three types of institutions that would benefit from AUP’s
List three AUP guidelines that should be used by schools
Three advantages of cryptocurrencies over normal currencies
What does the term Big data mean
Distinguish between normal currency and cryptocurrency
What is unotharised access on a network
Is when someone gains access to a network using someone else’s credentials or through other illegal methods
Guidelines that should be in AUPs
Clear descriptions of what will happen to a user who breaks the rules outlined in the AUP
When and how portable storage devices can be used
Restrictions on what software can be installed on the school’s computing devices
Guidelines on respecting copyright, intellectual property laws and privacy, as well as how to avoid plagiarism
Things to keep in mind when choosing a password
Make sure your password is at least 10 characters long or use a passphrase that is at least 15 characters long
Your password should not be something easy to guess such as “password” or “12345”
Make sure that your passwords are a mix of uppercase and lowercase letters, numbers and special characters
Make sure your passwoeee do not follow a pattern on the keyboard
Tips to keep in mind when using a network
Make sure that your devices have up-to-date antivirus software installed and that you never click on suspicious links or reply with personal information to suspicious emails
Respect others’s privacy and products. Do not download or share content that has been obtained illegally or content that violates someone else’s copyright
Be careful with what you share about yourself on the internet
Follow the AUPs of any network you are using
Tips to keep in mind when using a network
Make sure that your devices have up-to-date antivirus software installed and that you never click on suspicious links or reply with personal information to suspicious emails
Respect other’s privacy and products.
What is the foundation of database security
Confidentiality (C) - people should be able to trust that any information about them that is stored is safe and secure. Databases need to be encrypted to make sure that this is the case
Integrity (I) - it means that the data can only be accessed by people who have the correct permissions to view it
Availability(A) - means that databases should be up and running when users need to access them. This means that any downtime should be scheduled and if there is unexpected downtown, database administrators should check that this is not due to a security breach
How has capturing Big Data raised concerns about privacy?
It involves collecting large amounts of personal information, often without people knowing, which can be misused or leaked if not protected properly
What to do when someone hacks your account