Topic 6: Cyberspace, Network Security and Data Transfer Flashcards
What is Cyberspace
Cyberspace is a worldwide network of computers.
What is Cybercrime
Cybercrime is defined as using a computer to commit crime via the
internet. It can include planting viruses, theft of personal information, stealing
money from credit cards and theft of company data that could be sold to competitors
Hacking
Gaining unauthorised access with the intention of corrupting
data or to steal data.
Pornography
Pornography is often used as a means of hiding malware.
When an employee downloads adult content they are
increasing the risk of organisation data being corrupted by a
virus or stolen by an unauthorised user.
Cyber stalking
Where individuals use technology to harass others, for
example by sending inappropriate emails or making comments
on social media.
Data theft
The theft of customer records to obtain personal details which
are then used to commit identity fraud, such as credit card or
passport applications.
Digital forgery
Intentionally and falsely altering digital content, such as
pictures and documents. For example, changing a passport
photograph/name to sell to a criminal.
Cyber
defamation
Use of a digital communication application to distribute
damaging information about a user (2018).
Spamming
Use of a digital communication application to overload the user’s inbox with unwanted content
Phishing
Use of a digital communication application to obtain
personal information from users.
What is Malware
Malicious software that is downloaded onto a computer unintentionally.
Via the internet from email attachments.
By connecting a portable storage device such as a USB storage device.
What is a Hacker
Definition: Hacker is a term used to describe a person who gains unauthorised
access to a computer system.
What is a Virus
A virus is a software which is designed to damage a computer
system.
How are viruses spread
Viruses are spread through
infected portable storage devices, email attachments and the internet
Worms
Worms spread/replicates itself around computer/network
Does not need to be attached to a file/does not need a host file to cause
damage to data
Attaches to data being transmitted.
Can slow down data transmission/network .
It takes up hard drive storage space/memory space .
Examples: delete files/sends emails/damages files