Systems Software and Security Flashcards

1
Q

Malware

A

Software designed to disrupt, damage, or gain authorised access to a computer system (e.g viruses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Virus

A

A form of malware installed on a computer without the owners knowledge of permission, with the purpose of causing harm. It includes instructions to replicate automatically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

Phishing emails are designed to steal money, identity or login details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Blagging

A

The act of knowingly or recklessly obtaining or disclosing personal data or information without the consent of the controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute force attacks

A

An attack that goes through a list of different passwords or letters until access is gained

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DOS

A

Denial of service attacks are an attempt to prevent legitimate users from accessing a website, by flooding a company’s network with useless traffic, or by sending out millions of spam emails from an account, preventing legitimate emails from being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shouldering

A

Looking over someones shoulder while they type their PIN or password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL injection

A

Structured Query Language injection inserts malicious code into a database field on a website, exploiting security weaknesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Methods to identify vulnerabilities

A

Network forensics and penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network forensics

A

Using specialist software to look at transactions to verify they are not fraudulent, or stop a security attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Penetration testing

A
  • Gathering information about the targets of possible attacks
  • Identifying potential entry points
  • Attempting to break in
  • Report back the findings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Internal penetration testing

A

Tests how much damage could be done by an employee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network policies

A

Policies that determine acceptable use of networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Anti-malware software

A
  • Prevents harmful programs from being installed
  • Prevents important files, such as the operating system from being changed or deleted
  • Detects installed malware during regular scans and removing them
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Firewall

A

Designed to prevent unauthorised access to or from a private network or intranet. All messages entering or leaving the intranet pass through the firewall, which blocks those which don’t meet specified security criteria.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WIMP user interface

A

Windows, icons, menus and pointers

17
Q

User management

A

Enabling a network administrator to set different access rights for different users. The software also allows the administrator identify all users currently on the network, manually log out users, and monitor the times spent logged in

18
Q

Functions of an operating system

A
  • Providing a user interface
  • Memory management
  • Peripheral management
  • User management
  • File management
19
Q

Memory management

A

The allocation of blocks of free space in the main memory to a certain program or application

20
Q

Peripherals management

A

Controlling the sending of the data from the memory to the device driver upon receiving an instruction

21
Q

File management

A
  • Enable a user to create, modify, delete and move files
  • Allow a user to search for a particular file
  • keep track of the location of files on disk or other storage devices
  • keep track of the free space on disk where files can be stored
  • enable users to restore deleted files
  • prevent conflicts when two users on a network attempt to modify the same file
  • maintain access rights to files
22
Q

Utilities examples

A
  • Security utilities(e.g encryption software)
  • Disk organisation
  • Data compression utilities
  • File backup utilities
23
Q

Disk defragmentation

A

Moving separated parts of files around so that they can be stored together, optimising disk performance

24
Q

Automatic updating

A

Checks that any software installed on the computer is up to date, and downloads and installs any newer versions

25
Q

Compression software

A

Reduces the size of files

26
Q

Incremental backup

A

Only new files, or files recently changed are copied to the backup file

27
Q

Restoring from a backup

A

It’s faster to restore from a full backup, than an incremental backup, as when restoring from and incremental backup, the last full back up must be restored as well

28
Q

Archiving

A

Storing data which is not needed on a regular basis, usually by copying it to magnetic tape, and removing the original data from the hard drive