Social Implications Of Computer Networks Flashcards

1
Q

How does authentication work

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an acceptable use policy

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Compare your schools acceptable use policy with the list of guidelines given above. Make a suggestion on how to improve your school’s AUP

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the main concerns with BYOD policies in the workplace

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can companies avoid security and usage issues in a BYOD environment

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name three types of institutions that would benefit from AUP’s

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

List three AUP guidelines that should be used by schools

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Three advantages of cryptocurrencies over normal currencies

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the term Big data mean

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Distinguish between normal currency and cryptocurrency

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is unotharised access on a network

A

Is when someone gains access to a network using someone else’s credentials or through other illegal methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Guidelines that should be in AUPs

A

Clear descriptions of what will happen to a user who breaks the rules outlined in the AUP

When and how portable storage devices can be used

Restrictions on what software can be installed on the school’s computing devices

Guidelines on respecting copyright, intellectual property laws and privacy, as well as how to avoid plagiarism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Things to keep in mind when choosing a password

A

Make sure your password is at least 10 characters long or use a passphrase that is at least 15 characters long

Your password should not be something easy to guess such as “password” or “12345”

Make sure that your passwords are a mix of uppercase and lowercase letters, numbers and special characters

Make sure your passwoeee do not follow a pattern on the keyboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Tips to keep in mind when using a network

A

Make sure that your devices have up-to-date antivirus software installed and that you never click on suspicious links or reply with personal information to suspicious emails

Respect others’s privacy and products. Do not download or share content that has been obtained illegally or content that violates someone else’s copyright

Be careful with what you share about yourself on the internet

Follow the AUPs of any network you are using

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tips to keep in mind when using a network

A

Make sure that your devices have up-to-date antivirus software installed and that you never click on suspicious links or reply with personal information to suspicious emails

Respect other’s privacy and products.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the foundation of database security

A

Confidentiality (C) - people should be able to trust that any information about them that is stored is safe and secure. Databases need to be encrypted to make sure that this is the case

Integrity (I) - it means that the data can only be accessed by people who have the correct permissions to view it

Availability(A) - means that databases should be up and running when users need to access them. This means that any downtime should be scheduled and if there is unexpected downtown, database administrators should check that this is not due to a security breach

17
Q

How has capturing Big Data raised concerns about privacy?

A

It involves collecting large amounts of personal information, often without people knowing, which can be misused or leaked if not protected properly

18
Q

What to do when someone hacks your account