Topic 6: Cyberspace, Network Security and Data Transfer Flashcards
What is Cyberspace
Cyberspace is a worldwide network of computers.
What is Cybercrime
Cybercrime is defined as using a computer to commit crime via the
internet. It can include planting viruses, theft of personal information, stealing
money from credit cards and theft of company data that could be sold to competitors
Hacking
Gaining unauthorised access with the intention of corrupting
data or to steal data.
Pornography
Pornography is often used as a means of hiding malware.
When an employee downloads adult content they are
increasing the risk of organisation data being corrupted by a
virus or stolen by an unauthorised user.
Cyber stalking
Where individuals use technology to harass others, for
example by sending inappropriate emails or making comments
on social media.
Data theft
The theft of customer records to obtain personal details which
are then used to commit identity fraud, such as credit card or
passport applications.
Digital forgery
Intentionally and falsely altering digital content, such as
pictures and documents. For example, changing a passport
photograph/name to sell to a criminal.
Cyber
defamation
Use of a digital communication application to distribute
damaging information about a user (2018).
Spamming
Use of a digital communication application to overload the user’s inbox with unwanted content
Phishing
Use of a digital communication application to obtain
personal information from users.
What is Malware
Malicious software that is downloaded onto a computer unintentionally.
Via the internet from email attachments.
By connecting a portable storage device such as a USB storage device.
What is a Hacker
Definition: Hacker is a term used to describe a person who gains unauthorised
access to a computer system.
What is a Virus
A virus is a software which is designed to damage a computer
system.
How are viruses spread
Viruses are spread through
infected portable storage devices, email attachments and the internet
Worms
Worms spread/replicates itself around computer/network
Does not need to be attached to a file/does not need a host file to cause
damage to data
Attaches to data being transmitted.
Can slow down data transmission/network .
It takes up hard drive storage space/memory space .
Examples: delete files/sends emails/damages files
Trojan Horse
A program used by hackers to try to gain access to users’ systems
Example of damage, such as deleting data files
What is a Key Logger, why is it a security risk too
A Key Logger is a type of spyware which will record every keystroke that a
user carries out and sends it secretly across the internet
This is a security risk
when buying products or services online, as credit card details and passwords can be captured
What is Spyware
is software that allows the user to gain information about another
person’s computer activity e.g. passwords, bank and credit card details
Encryption meaning
Special software is used to encode/scramble data before transmission, using
an encryption key.
Characteristics of a good password
Mixture of letters/numbers/special characters/upper and lower case.
Kept confidential/Not a recognisable term/ word/ not easily guessed.
Reference to a minimum length. For example, must be at least 8 characters’
long.
Impossible to guess.
How Access Levels can help protect data on a network
User activities are limited by levels of access.
Access rights/levels can be classified as ‘read only’/’read and copy’/’read and
write’.
Data files can be allocated access rights/levels/require access privileges for
access.
Example: School pupils, teachers and the Network Manager have different
levels of access. In Shared Resources pupils have read/copy access while
staff have read/write access.
How Access Levels can help prevent data theft on a network
Ensures authorised users have correct access.
Prevents unauthorised users from accessing data.
Suitable example – read only or suitable role e.g. Pupil.
What is Backup
A copy of data in case the original version is lost or damaged
What is firewall
are used to control traffic over a network and any networks connected to it.
They can be software or hardware-based and essentially act as a barrier, designed to
block unauthorised access whilst allowing outward communication.
Firewalls can do what
Prevent unauthorised access (hackers) to the network.
Prevent spam and viruses from entering the network.
Stop upload/download of unauthorised data/ controls/ monitors data entering/
leaving the network.
Provide information on unauthorised access.
How firewalls protect a network
Monitors/controls incoming/outgoing data.
Filters data/prevents data being hacked.
Based on rules.
Definition Protocol Purpose
Allows hardware devices made by manufacturers to communicate.
Definition Protocol Role:
A set of rules to allow communication between two
different communication systems
FTP - File Transfer
Protocol
Allows users to send and receive files over the internet.
HTTP - Hyper Text
Transfer Protocol
When a user enters a URL into the address bar of the browser, this protocol
sends a command to the web browser to request the required
webpage. If a webpage cannot be located (eg. because it has
been deleted) HTTP will report an error eg. ‘404 File Not
Found’.
HTTPS - Hyper
Text Transfer
Protocol Secure
Its purpose is to enable the user to safely use the
internet to stop user files being corrupted/deleted eg.
when using online banking
SET - Secure
Electronic
Transaction
This is a protocol used by Visa and MasterCard designed to
make online purchases much more secure for card users.