Unit 3- Operating Online Flashcards

1
Q

What is unauthorised access?

A
  • when a user gains access to a network without permission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can unauthorised access be the result of?

A
  • direct entry - a user tries to gain access directly by themselves or by by using software designed to try username and password combinations repeatedly (brute force attack)
  • indirect entry - a users tries to gain access indirectly by exploiting vulnerabilities in software or users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are botnets?

A
  • groups of computers that are used without an owners knowledge to carry out harmful activities or spread malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can accidental deletion occur?

A
  • Presses the wrong key on a keyboard
  • Formats media on the wrong device
  • Loses power unexpectedly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is malware?

A

Malware (malicious software) is the term used for any software that has been created with malicious intent to cause harm to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are some examples of issues caused by malware?

A
  • Files being deleted, corrupted or encrypted
  • Internet connection becoming slow or unusable
  • Computer crashing or shutting down
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different types of malware?

A

virus, worms, trojan, spyware and ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a virus do?

A
  • program which can replicate itself on a users computer
  • contains a code that will cause unwanted and unexpected events to occur
    examples of issues a user may experience are:
  • corrupt files
  • delete data
  • prevent applications from running correctly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the malware worms do?

A
  • very similar to viruses
  • the main differences being they spread to other drives and computers on the network
    worms can infect other computers from:
  • infected websites
  • instant messages services
  • email
  • network connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does a trojan do?

A
  • sometimes called a trojan horse
  • trojans disguise themselves as legitimate software but contain malicious code in the background
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does spyware do?

A
  • software which will allow a person to spy on the users activities on their devices
  • form of software will be embedded into other software such as games or programs that have been downloaded from illegitimate sources
  • can record your screen, log your keystrokes to gain access to passwords and more
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Ransomware do?

A
  • form of malware that locks your computer or device that encrypts your documents and other important files
  • a demand is made for money to receive the password that will allow the user to decrypt the files
  • no guarantee that paying the ransom will result in the user getting their data back
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing?

A
  • form of social engineering
  • involves sending fraudulent, legitimate looking emails to large number of email addresses (they claim to be from a reputable company or trusted source and try and gain access to your details)
  • tries to coax the user to click on a log in button and enter their details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the effects of phishing?

A
  • creator of the email can gain unauthorised access- this gains personal data like login information, bank accounts
  • can lead to identity theft or fraudulent activity on credit cards and bank accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can phishing be prevented?

A

Phishing can be prevented by:

  • Anti-spam filters to avoid fraudulent emails arriving in a user’s inbox
  • Training staff to recognise fraudulent emails and to avoid opening attachments from unrecognised senders
  • User access levels to prevent staff from being able to open files-types such as executable (.exe) files and batch (.bat) files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is pharming?

A

Pharming is typing a website address into a browser and it is redirected to a ‘fake’ website to trick a user into typing in sensitive information such as passwords

An attacker attempts to alter DNS settings or change a users browser settings to redirect users to the fraudulent website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the effects of pharming?

A

The creator of the malicious content can gain unauthorised access to personal data such as login information, bank accounts and more

  • can lead to identity theft or fraudulent activity on credit cards and bank accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How can pharming be prevented?

A
  • Keeping anti-malware software up to date
  • Checking URLs regularly
  • Make sure the padlock icon is visible
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Exam question: Explain why phishing messages are sent to many users (2 marks)

A

It increases the chances of a user responding [1] because not all users are vulnerable / phishing targets vulnerable users / more people are aware of phishing [1]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is a strong password?

A

Strong passwords should contain:

  • More than eight characters
  • mixture of letters, numbers and symbols
  • mixture of uppercase and lowercase letters
  • Uncommon words/phrases

Passwords should be changed regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are biometrics?

A

Biometrics are a way of authenticating a user by using their unique human characteristics

Some of the ways biometrics can be used are:
- Fingerprint scans
- Retina scans
- Facial recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the advantages of biometrics?

A
  • Unique to the person and can not be copied, meaning that the data is always with the person
    -Passwords can be easily copied, forgotten, guessed or cracked
  • It is difficult to copy or forge biometric data
  • Eliminates the possibility of attacks such as shoulder surfing and key-logging software
  • A high degree of accuracy as there is no known way to copy a person’s retina pattern for example
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the disadvantages of biometrics?

A
  • can be intrusive, for example, scanning eyes
  • Scans be not be recognised, an example of could be fingerprint scans with dirty hands
  • Very expensive to install
  • Low light can provide an issue for facial recognition as well as hats and glasses
  • People may be uncomfortable having their most unique characteristics being stored in a database
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is CAPCHA?

A
  • method of testing if a website request originates from a human or a machine (bot)
  • used to prevent spam and protect logins

Completely Automated Public Turing test to tell Computers & Humans Apart (CAPTCHA) examples include:

Text - Asking users to enter characters from a distorted text box, users would need to decipher the characters and enter them in a designated box

Image - A grid of images, a user would be asked to select all those that contain a specific object

Checkbox - A simple checkbox appears asking the user to confirm they are not a robot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is anti-malware software?

A

Anti-malware software is a term used to describe a combination of different software to prevent computers from being susceptible to viruses and other malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the different software anti-malware includes?

A

Anti-virus

Anti-spam

Anti-spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

How does anti-malware work?

A
  • scans through email attachments, websites and downloaded files to search for issues
  • has a list of known malware signatures to block immediately if they try to access your device in any way

Anti-malware will also perform checks for updates to ensure the database of known issues is up to date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are access rights? What are the three forms of access rights?

A
  • ensure users of a network can access what they need to access and do not have access to information/resources they shouldn’t
  • Users can have designated roles on a network
  • can be set based on a user’s role, responsibility, or clearance level

Full access - this allows the user to open, create, edit & delete files

Read-only access - this only allows the user to open files without editing or deleting

No access - this hides the file from the use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What are some examples of different rights of access to a school network?

A

(Users and groups of users can be given specific file permissions)

Administrators: Unrestricted - Can access all areas of the network

Teaching Staff: Partially restricted - Can access all student data but cannot access other staff members’ data

Students: Restricted - Can only access their own data and files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is HTTP and HTTPS?

A

Hypertext Transfer Protocol (HTTP) allows communication between clients and servers for website viewing

HTTP allows clients to receive data from the sever (fetching a webpage) and send data to the server (submitting a form, uploading a file)

HTTPS works in the same way as HTTP but with an added layer of security

All data sent and received using HTTPS is encrypted

HTTPS is used to protect sensitive information such as passwords, financial information and personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is email safety?

A

Users should be aware of the dangers when using email, especially email attachments and web links

To ensure users use email safely they should take extra caution when:

  • Email is from an unknown sender
  • Text is general or impersonal
  • Contains spelling, punctuation or grammar mistakes
  • Attached files are executable files (.exe)
  • Urgency is the tone of the message
  • Don’t recognise the URL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is backup software?

A
  • used to create copies of personal data in order to keep it safe in the event of:

Accidental loss

Data theft

  • can be automated and scheduled to happen at less busy periods of the day, to not take up valuable system resources (e.g. overnight etc.)
  • can be stored locally (secondary storage) or remotely (cloud)
  • Backup software can be purchased or come as a standalone application bundled with an operating system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What are the two ways backups can be made?

A

Full - all files are backed up (saftest, slow)

Incremental - only files that have been added/modified since the last backup are backed up (faster, less secure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are online payment systems?

A

eliminate the need for physical cash by facilitating the payment of good and services online
The most common online payment systems include:

Third party payment processors

Bank cards

Contactless (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What do online payment systems offer?

A

Convenience - pay for anything, anytime, from anywhere

Security - encryption protects sensitive information

Increased reach - can be used for international transactions

Transparency - digital records kept for easy monitoring and resolving disputes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What are third party payment processors?

A

Third party payment processors facilitate online payments using an email address as identification

They can be linked to online shopping applications to make the purchasing process easier & faster

Popular third party payment processors include:
-PayPal
-Worldpay
- Stripe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are bank cards?

A

A bank card can be used to pay for good and services online using information found on the card
When making a purchases, the following information is required:
-16 digit card number
- Expiry date
- Security number (CVC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What are contactless payments (NFC)?

A
  • Contactless payments can be made using near field communication (NFC)

If a contactless card is in close proximity of a reader requesting a payment then a transaction can take place

No extra authentication takes place, but the amount is limited
Limits are there to deter criminals as only small amounts can be stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

How can you protect online payments?

A

Online payment systems can be protected using a number of methods such as:

  • Banks - monitoring payments and/or analysing spending patterns (if card is lost/stolen/cloned)
  • Encryption for online payments
  • Two factor authentication (2FA)
  • Using secure websites (HTTPS)
39
Q

Exam question:
David buys a coffee in a store.

David pays with a card using NFC.

Explain why NFC speeds up the payment process. (2 marks)

A

Users can scan/tap their card / do not have to insert their card / do not have to enter their PIN/code [1]…

…because NFC is a contactless payment method [1]

40
Q

What are the impacts of the internet on employment?

A

The three biggest impacts of the internet on employment are:

change in skills requirements

new job opportunities

job losses

41
Q

What are the skill requirements for employment?

A

The demand for tech skills and competence in information communication technology (ICT)

-ability to work with and analyse more data to make informed business decisions
-A shift in the need for particular skill sets due to more automation means potential employees need to be adaptable
-A focus on problem solving and critical thinking rather than carrying out tasks that can now be automated

An increased importance on soft skills such as:

Effective communication

Collaboration

Lifelong learning

42
Q

What is a description of cyber security?

A

Skilled works to look after and protect systems from attack

Trained to work with computer systems and networks

43
Q

What is a description of data science?

A

Experts to analyse data and extract insights

Programming knowledge

44
Q

What is a description of Artificial intelligence (AI) & machine learning (ML)?

A

Developing AI in all industries

Working with machine learning algorithms

45
Q

What is a description of Digital Marketing?

A

Content creation

Search engine optimisation (SEO)

Social media marketing

46
Q

What is a description of Cloud computing?

A

Cloud architects

Security specialists

47
Q

Why might someone experience a job loss?

A

-employees who choose to not improve their skills using the internet may unfortunately not have the skills required to carry out new work

If they are unwilling to retrain this may lead to job losses

48
Q

What are working practices?

A

Working practices are the ways in which a person goes about completing a task as part of their job

Examples of working practices include:

Collaborative working

Flexible working

49
Q

What is collaborative working?

A
  • means employees can work on the same project or task at the same time, in real time
  • internet enables employees to work together remotely, bridging the gap of being in the same place at the same time

This allows employers to choose employees from a much wider talent pool

50
Q

What are the advantages of collaborative working?

A
  • Efficiency - tasks can be completed more quickly
  • Knowledge - shared skills and experience
  • Creativity - access to other perspectives, problem solving as a team
  • Morale - motivate employees by building a team spirit
51
Q

What are the disadvantages of collaborative working?

A

-Co-ordination - organising meetings and keeping people on the same page can be hard
-Personality clashes - some people do not work well in a team and can hinder progress
-Contribution - some members might not contribute equally

52
Q

What is flexible working?

A
  • means employees can work when suits them

They can decide the hours they work or work from home

The internet also makes working on the move an option for employees

53
Q

What are the advantages of flexible working?

A

Work life balance - can schedule work around personal commitments

Productivity - working when YOU feel the most productive

Fewer sick days - better work life balance leads to fewer absences

54
Q

What are the disadvantages of flexible working?

A

Communication - lack of face to face can hinder collaboration

Isolation - missing social aspects of traditional office environment

Management - supervising and monitoring employees can be more difficult

55
Q

Exam question:
Sarah uses the Internet for work.

Sarah can collaborate with others so expertise can be shared.

Explain one other way that the Internet could positively impact how Sarah works (2 marks)

A

more productive / doesn’t waste time [1]

better motivated [1]

more flexibility [1]

better work life balance [1]

Reason:

work at home / on the move [1]

access online files/information/resources/software [1]

56
Q

Does the internet give access to more information?

A

Yes, the internet gives access to a wealth of information
Individuals can keep up to date with news, sport and weather information 24 hours a day
Traditional media such as television and radio have some disadvantages that the internet has solved

57
Q

What are the differences between television and radio and the internet?

A

Television and radio: broadcast at set times, limited number of channels, editors decide on content, held to standard

Internet: 24/7 availability, millions of channels, not always edited, access from anywhere with a connection, not always held to any standards

58
Q

How has the internet given people access to new ways of learning?

A

Virtual learning environments (VLEs) - online support from teachers and students
Social learning - social media platforms enable learners to share resources, ideas and projects
Gamification - making learning engaging and interaction, promoting knowledge retention
Virtual reality (VR) - immersive experiences, bringing abstract concepts to life

59
Q

What can users access online gaming systems for?

A
  • Travel
  • Shopping
  • Banking
60
Q

The internet has provided users with access to on-demand services such as streaming what?

A
  • movies
  • television
  • music
61
Q

What is social communication?

A
  • communication with and reaction to others

Humans are naturally social and the internet has given users different ways to participate socially

62
Q

How has the internet given us ways to participate socially?

A
  • Online gaming
  • Video
  • Instant messaging
  • Social networking
  • Online space for work & learning
63
Q

What are some examples for social interaction?

A
  • Connection & community - connect with people with the same interests, regardless of location
  • Expression - platforms give a space to explore yourself freely, find communities that can support
  • Social support & mental health - give people a sense of belonging and support, important for people who feel isolated or struggle with mental health
  • Convenience - no travelling or scheduling, can take place 24/7
  • Social change - powerful tools for social activism and raising awareness about important issues
64
Q

What are some examples against social interaction?

A
  • Misinformation - algorithms can limit exposure to diverse perspectives and help spread misinformation
  • Privacy - sharing information online can lead to privacy concerns, where is the data kept and who has access
  • Distraction - online notifications can be a distraction, hindering productivity
  • Addiction - too much interaction can be addictive
  • Social comparisons - can lead to low self esteem and poor mental health as constantly comparing yourself to others
65
Q

What is cyberbullying?

A

Cyberbullying is using the internet to send text, images or multimedia in order to upset or embarrass someone

66
Q

What can online bullying range from?

A
  • Hurtful messages
  • Distributing upsetting images
  • Preventing participation in online events/discussions (isolating)
67
Q

Why is reduced physical activity a concern?

A

Reduced physical activity is a concern as people have more access to online goods and services and do not need to leave the comfort of their houses

68
Q

Why can reduced physical activity effect someone’s health?

A
  • increased blood pressure
  • metabolic issues
  • weakened immune system
69
Q

Why can reduced physical activity effect someones wellbeing?

A
  • increased anxiety and depression
  • poor sleep quality
  • decreased social interaction
70
Q

How has the availability of digital devices changed the way people work?

A
71
Q

How has the availability of digital devices changed the way people work?

A

workers required access to computer systems and would access them from an office environment (centralised)

To facilitate access, office hours such as 09:00 to 17:00 were common

As digital devices became cheaper and more powerful, these devices were increasingly used at home

72
Q

What can digital devices be used to?

A

Run a range of software

Access the internet

Access online systems & applications

73
Q

What are the drawbacks to organisations of working from home?

A
  • concerns about data security
  • difficult to manage and support employees
  • employees might not work as hard
74
Q

What are the benefits to organisations of working from home?

A
  • attracts talented/motivated workforce
  • employee from a wider location
  • no need to buy or rent office space
  • no commuting for employees
  • workers work more efficiently from home
  • complications with payroll for employees in different countries
75
Q

What are the benefits for employees of working from home?

A
  • no need to travel to work
  • more time working/resting as there is no travelling
  • work at a time to suit them
  • less distractions
  • comfortable environment
76
Q

What are the drawbacks for employees of working from home?

A
  • distractions at home (family, leisure activities)
  • lack of social interaction
  • feel disconnected from the company
77
Q

What are the positive impacts of the internet on organisations?

A
  • improved communication
  • access to global markets
  • access to global workforce
78
Q

What are the examples of how organisations can communicate with its customers

A
  • websites
  • emails
  • instant messaging
  • social interaction
79
Q

What has access to global markets ( internet means organisations can advertise and sell to customers in countries around the world) helped sell products online and reduce costs on?

A
  • overheads (rent, utilities and staff)
  • packaging
  • postal charges
80
Q

How has Access to global workforce had an impact on organisations?

A

With the internet, organisations can now find and hire the best talent for the job, regardless of location

Organisations can be more selective, they are not limited to employees within travelling distance of a place of work

They can select employees from different time zones and utilise different skills

Organisations may be able to reduce costs, for example, wages in some countries may be lower

81
Q

What are the negative impacts of the internet on organisations?

A

The negative impacts of the internet on organisations are:

Security issues

Greater competition

82
Q

How information is managed and used?

A

Organisations use big data collected from smartphones, online applications, social media and payments systems to find patterns of behaviour

This allows organisations to improve the customer experience and improve process efficiency

83
Q

Where do organisations store private and valuble data?

A

using physical safety methods like: walls, locks, alarms, security guards

84
Q

How can employees access secure data working remotely?

A

VPN (link here) - remotely access organisations data on servers

Transfer a copy of organisations data to home via external storage or email

Storing organisations data on someone else’s server (cloud)

85
Q

With Data being accessed remotely means it is more vulnerable to threats such as? How can we prevent this?

A

Employees revealing login details intentionally/accidentally - Policies to ensure employees are accountable for their actions

Unauthorised users intercepting data being transferred on the internet- Encryption

Unauthorised users hack in to the organisations systems- Firewalls/authentication

86
Q

What are some examples of their being greater competition for products and services due to the internet?

A

Music/film rental- Online downloads & streaming

Record labels- Independent artists can release their own music online

Estate agents- Online advertising/virtual viewings

Newspaper publishers- Online news and information services

Postal services- Send messages and digital media instantly

87
Q

Exam question - Describe two positive impacts of the Internet on organisations (4 marks)

A

Improved communication/collaboration [1] through the use of email/messaging services / hosted applications/storage [1]

Increased access to international markets/workforce [1] due to the global reach of the web / opportunities for more flexible working [1]

Improvements in access to customer information [1] through analysis of big data [1]

Make use of transactional data [1] to carry out targeted marketing [1]

Maintains workforce productivity [1] if workforce is unable to attend the workplace

88
Q

What is the impact of less-restricted networks

A

Broadcastings

Publishing

The internet

89
Q

How has Broadcasting a message had an impact of less-restricted networks?

A

Before the internet, an individual would need to persuade a media outlet to broadcast their message

It was difficult to get a message to the masses

Social media and video streaming have given society a platform to share their own messages to a global audience

90
Q

How has Online content had an impact of less-restricted networks?

A

Controlled by moderators

Service owners control content can be published

Algorithms determine what content watchers see based upon browsing history & online activity

Paid promotion will be seen by more users than individuals that don’t pay

91
Q

How has User generated reference sites had an impact on less- restricted networks?

A

Sites such as Wikipedia have removed the element of fact checking by experts or editors

Users can contribute content that may or may not be true

92
Q

How has Law enforcement had an impact on less- restricted networks?

A

Negative

Use of social media and video messaging services to organise illegal activities whilst avoiding police

Positive

Use of a network of CCTV cameras to record illegal actions

Footage captured on social media to help identify suspects

Social media used to organise events to support victims

93
Q

What is the information gap?

A

The information gap refers to the divide created between people who have access to online information, and those that do not

94
Q

What is the difference between information rich and information poor?

A

Information rich- Good access to information, this improves education and helps enable them to make decisions

Information poor- Reduced access to information, this decreases education and reduces their ability to make decisions