Topic 8: Security Risks and Precautions Flashcards
Networks can be structured as
peer-to-peer or Client-server
A peer to peer network is used for
a small number of computers
Advantages of a peer to peer network is that they are
relatively inexpensive to set up and less cable is need.
Disadvantages of peer to peer networks is
that each computer needs to be backed up individually, the network is less secure, software updates must be done individually and no shared access to printers
Client server network is used for
a larger network of computers. One central computer called a server manages the other client computers on the network
Advantages of a client server network are;
all computers are backed up centrally, network more secure, software updates can be done remotely and shared access to printers
Disadvantages of a client server network are;
Relatively expensive to setup, more cable needed and network fails if server goes down
Cloud storage is a form of
data storage offered by firms like Google.
Advantages of cloud storage are
accessible from any device via internet and security and backup provided as part of the service
Disadvantages of cloud storage are;
without internet connection no data can be accessed, can be more expensive than conventional storage per Gb
A virus is a
program which copies itself, then it attaches itself to various programs inside the computer. This damages the programs.
Worm is similar to a virus because it
makes copies of itself but these copies accumulate in the memory of your computer until there is no free memory left and the computer freezes.
A Trojan horse usually shortened to Trojan is
a program which damages your computer system but it doesn’t make copies of itself.
Examples of Trojan activity include
unwanted adverts on browser windows, installing unwanted toolbars and changing the browser homepage or default search engine.
Hacking is
unauthorized access to any computer system/network.
Hacking may involve either
theft of data or modification of data.
Hacking is punishable by up to
7 years imprisonment under the Computer Misuse Act
Ant virus software is a collection of
programs which are used to prevent damage to computer systems/networks by malware
Some examples of anti virus software are
firewall, email scanner, drive scanner, anti-malware, anti-spyware and parental controls
A firewall is a program which has
a set of rules it uses to stop unauthorized access to your computer system/network
Spyware is any software that
covertly gathers user information through the user’s internet connection without his or her knowledge usually for advertising purposes.
Phishing is the act of
sending an email to a user falsely claiming to be a legitimate business in an attempt to scam the user into surrendering private information that will be used for identity theft.
A phishing email usually directs the user to a
web site where they are asked to update personal information such as passwords and credit card details.