Topic 8- security and ethics Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is hacking?

A

illegally gaining access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

illegally gaining access to a computer system in known as

A

hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do people hack (5)

A
  • Curiosity
  • Financial Gain
  • Malicious
  • Hacktivism
  • Military
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Curiosity,Financial Gain,Malicious,Hacktivism,Military are all reasons to___?

A

Hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Cracking is

A

Changing a program’s source code to be used for another use (illegal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Changing a program’s source code to be used for another use illegally is known as

A

Cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware

A

Software which tracks keylogs and through this can find out passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software which tracks keylogs and through this can find out passwords. Is known as

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is Spyware prevented

A

Antispyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Antispyware prevents___?

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spyware (5)

A
  • User clicks on a link from an email or website
  • When clicked spyware is downloaded
  • Monitors users activity and relays it back to author
  • Keypresses can be analysed to find passwords
  • Common key logs allow password to be found
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Viruses (3)

A
  • Program that replicates itself
  • Deletes or corrupts files
  • Ransomware a new form of virus
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing (5)

A
  • Fake email sent that looks legitimate
  • User clicks on link in the email
  • User redirected to fake website
  • Often used to try and steal financial details
  • How to avoid – Don’t click on links from unknown emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pharming (3)

A
  • Malicious code stored on a computer
  • Redirects user to fake website to steal users data
  • How to avoid – check the URL is as expected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cookies (4)

A
  • Message given to browser by webserver
  • Stored in a text file
  • Stores detail about users preferences on a website
  • Message sent back to server each time that page is requested
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Cookies uses (5)

A
  • Enable logon information to be kept
  • Provide customized pages for the user
  • Enable target adverts
  • Enable one-click purchasing with shopping carts
  • Be able to distinguish between new and repeat visitors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Causes of data loss (5)

A
  • Accidental Deletion
  • Malicious – virus
  • Hardware failure
  • Software failure
  • Natural disaster
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Data loss prevention (4)

A
  • Set data to read only
  • Use correct shut down procedures
  • Use correct procedures when removing portable storage devices
  • Backup
19
Q

Firewalls(5)

A
  • Prevents unauthorized access
  • Acts as a filter for incoming/outgoing data
  • Checks data meets criteria
  • Logs incoming and outgoing traffic
  • Blocks access to specified IP addresses
20
Q

Antivirus (2)

A
  • Compares virus signature against a database of known virus signatures
  • Removes any viruses
21
Q

Proxy servers (3)

A
  • Keeps user IP address secret
  • Prevents direct access to a web server
  • Filters traffic
22
Q

Biometrics examples (3)

A
  • Voice recognition
  • Facial Recognition
  • Thumbprint
23
Q

Text v Biometric (2)

A
  • Text passwords easier to hack than biometrics

- Biometric passwords are unique and can’t be shared

24
Q

Security methods (2)

A
  • Encryption

- SSL

25
Q

SSL (5)

A
  • Uses encryption
  • Uses SSL
  • Uses digital certificates – contains public key
  • Makes use of public and private keys
  • Data is meaningless without the key
26
Q

How can we tell a website is using SSL(3)

A
  • Protocol end in s e.g. https
  • Padlock on some browsers
  • Colour of address bar changes
27
Q

SSL process (5)

A
  • Web browser connects to the website
  • Web browser requests web server to identify itself
  • Web server sends browser a copy of its SSL certificate
  • Browser checks the certificate is trustworthy and sends message back to server
  • Server acknowledges message and SSL session begins
28
Q

TLS layers (2)

A
  • Record

- Handshake

29
Q

Record layer (2)

A
  • Contains the data being transferred

- Can be used with or without encryption

30
Q

Handshake layer (2)

A
  • Website and client authenticate each other

- Encryption algorithms used to establish secure session

31
Q

Differences between TLS and SSL (3)

A
  • Possible to extend TLS using new authentication methods
  • TLS can make use of session caching
  • TLS separates handshake and record protocol
32
Q

How does encryption work on text (6)

A
  • Before encryption it is plain text
  • Text encrypted using an algorithm
  • Text encrypted using a key
  • Encrypted text called cypher text
  • Key transmitted separately from text
  • Key used to decrypt the cypher text
33
Q

Assymetric(5)

A
  • Private key and Public key needed
  • Public key given to everyone
  • Private key only known by the computer user
  • Encryption keys generated using a hashing algorithm
  • Different keys
34
Q

Plain text & Cyper text

A
  • Text encrypted using encryption algorithm
  • Text encrypted using a key
  • Key transmitted separately from the text
  • Key used to decrypt the text
35
Q

Authentication (1)

A

-Used to verify that data comes from trusted source

36
Q

Symmetric Encryption (1)

A

-Uses the same key to encrypt and decrypt data

37
Q

Hashing algorithm (4)

A
  • Takes message or key and translates it into string of characters
  • Usually shown in hex notation
  • Length depends on algorithm used
  • Same hashing algorithm needed to decrypt
38
Q

DoS Attacks (4)

A
  • Large number of requests sent to server at once
  • Designed to flood a server with useless traffic
  • Server will come to a stop trying to deal with the traffic
  • Prevents users gaining access to the web server
39
Q

Ethics (1)

A

-Set of laws that regulate computers

40
Q

Misuse of ethics (5)

A
  • Hacking/Malware
  • Copyright
  • Stealing personal Information
  • Addiction or health issues
  • E waste
41
Q

Types of softaware(3)

A
  • Free software
  • Freeware
  • Shareware
42
Q

Free software (4)

A
  • Can use for any legal purpose you wish
  • Can study and change the source code
  • Can pass on to other people
  • Must not be used to infringe copyright laws by copying existing software
43
Q

Freeware(2)

A
  • Can download and use free of charge

- Cannot view or modify the source code e.g. Skype

44
Q

Shareware (5)

A
  • Can use for a trial free of charge
  • Need to pay once the trial is over
  • Often trial version missing key features
  • Protected fully by copyright laws
  • Cannot modify code or distribute the software