Topic 6: Cyberspace, Network Security and Data Transfer Flashcards

1
Q

What is Cyberspace

A

Cyberspace is a worldwide network of computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Cybercrime

A

Cybercrime is defined as using a computer to commit crime via the
internet. It can include planting viruses, theft of personal information, stealing
money from credit cards and theft of company data that could be sold to competitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hacking

A

Gaining unauthorised access with the intention of corrupting
data or to steal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Pornography

A

Pornography is often used as a means of hiding malware.
When an employee downloads adult content they are
increasing the risk of organisation data being corrupted by a
virus or stolen by an unauthorised user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cyber stalking

A

Where individuals use technology to harass others, for
example by sending inappropriate emails or making comments
on social media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data theft

A

The theft of customer records to obtain personal details which
are then used to commit identity fraud, such as credit card or
passport applications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital forgery

A

Intentionally and falsely altering digital content, such as
pictures and documents. For example, changing a passport
photograph/name to sell to a criminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyber
defamation

A

Use of a digital communication application to distribute
damaging information about a user (2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Spamming

A

Use of a digital communication application to overload the user’s inbox with unwanted content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

A

Use of a digital communication application to obtain
personal information from users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Malware

A

 Malicious software that is downloaded onto a computer unintentionally.
 Via the internet from email attachments.
 By connecting a portable storage device such as a USB storage device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Hacker

A

Definition: Hacker is a term used to describe a person who gains unauthorised
access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Virus

A

A virus is a software which is designed to damage a computer
system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How are viruses spread

A

Viruses are spread through
infected portable storage devices, email attachments and the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Worms

A

Worms spread/replicates itself around computer/network
 Does not need to be attached to a file/does not need a host file to cause
damage to data
 Attaches to data being transmitted.
 Can slow down data transmission/network .
 It takes up hard drive storage space/memory space .
 Examples: delete files/sends emails/damages files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Trojan Horse

A

 A program used by hackers to try to gain access to users’ systems
 Example of damage, such as deleting data files

17
Q

What is a Key Logger, why is it a security risk too

A

A Key Logger is a type of spyware which will record every keystroke that a
user carries out and sends it secretly across the internet

This is a security risk
when buying products or services online, as credit card details and passwords can be captured

18
Q

What is Spyware

A

is software that allows the user to gain information about another
person’s computer activity e.g. passwords, bank and credit card details

19
Q

Encryption meaning

A

Special software is used to encode/scramble data before transmission, using
an encryption key.

20
Q

Characteristics of a good password

A

 Mixture of letters/numbers/special characters/upper and lower case.
 Kept confidential/Not a recognisable term/ word/ not easily guessed.
 Reference to a minimum length. For example, must be at least 8 characters’
long.
 Impossible to guess.

21
Q

How Access Levels can help protect data on a network

A

 User activities are limited by levels of access.
 Access rights/levels can be classified as ‘read only’/’read and copy’/’read and
write’.
 Data files can be allocated access rights/levels/require access privileges for
access.
 Example: School pupils, teachers and the Network Manager have different
levels of access. In Shared Resources pupils have read/copy access while
staff have read/write access.

22
Q

How Access Levels can help prevent data theft on a network

A

 Ensures authorised users have correct access.
 Prevents unauthorised users from accessing data.
 Suitable example – read only or suitable role e.g. Pupil.

23
Q

What is Backup

A

A copy of data in case the original version is lost or damaged

24
Q

What is firewall

A

are used to control traffic over a network and any networks connected to it.
They can be software or hardware-based and essentially act as a barrier, designed to
block unauthorised access whilst allowing outward communication.

25
Q

Firewalls can do what

A

Prevent unauthorised access (hackers) to the network.
 Prevent spam and viruses from entering the network.
 Stop upload/download of unauthorised data/ controls/ monitors data entering/
leaving the network.
 Provide information on unauthorised access.

26
Q

How firewalls protect a network

A

 Monitors/controls incoming/outgoing data.
 Filters data/prevents data being hacked.
 Based on rules.

27
Q

Definition Protocol Purpose

A

Allows hardware devices made by manufacturers to communicate.

28
Q

Definition Protocol Role:

A

A set of rules to allow communication between two
different communication systems

29
Q

FTP - File Transfer
Protocol

A

Allows users to send and receive files over the internet.

30
Q

HTTP - Hyper Text
Transfer Protocol

A

When a user enters a URL into the address bar of the browser, this protocol
sends a command to the web browser to request the required
webpage. If a webpage cannot be located (eg. because it has
been deleted) HTTP will report an error eg. ‘404 File Not
Found’.

31
Q

HTTPS - Hyper
Text Transfer
Protocol Secure

A

Its purpose is to enable the user to safely use the
internet to stop user files being corrupted/deleted eg.
when using online banking

32
Q

SET - Secure
Electronic
Transaction

A

This is a protocol used by Visa and MasterCard designed to
make online purchases much more secure for card users.

33
Q
A