Unit 4 Security And Ethics Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Describe how the SSL works

A

− Browser / client sends request to webserver for identification
− Web server sends its digital / security certificate
− Browser authenticates certificate
− If authentic connection, is established any data sent is encrypted
− Using public and private key to do this

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe how the TSL works

A

− Handshake and record protocols
− Client/Browser requests secure connection to web server
− Browser requests server to identify itself
− Web server then provides digital certificate after identification
− Browser validates certificate
− Browser sends signal to web server to begin transmission
− Session key generated
− Encryption method is agreed on

The handshake protocol is used to exchange all the information needed by both computers in order to establish a secure SSL/TLS connection

The record protocol handles the actual data and it’s encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe how a browser accesses a web page

A
  • Browser sends URL to DNS using HTTP
  • DNS find matching IP address for URL and sends it to the browser
  • Browser requests web server for web pages
  • Web pages are then sent from web server to the web
    browser
  • Browser then renders the HTML to display web pages
  • Security certificates authenticated, SSL and TSL used to
    encrypt data sent to and fro
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe how a proxy server works

A

− Acts as mediator between the user’s computer and web server
− Allows internet traffic to be filtered
− Speed access to information on website using cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe encryption

A
− Encryption key used
− Key uses algorithm to scramble data
− Data before encryption is plain text
− After encryption it is known as cypher text
− Same key used to decrypt data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe symmetric encryption

A

− Key is kept secret, only sender and receiver know
− Sender uses same key to encrypt and decrypt
− Key has to be sent over internet, can be intercepted
− Less safe but fast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe asymmetric encryption

A

− Public and private key mathematically linked
− Public key used to encrypt, anyone can see
− Private key not transmitted, used to decrypt
− Safer process but slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe a Denial of Service attack

A

− Webserver is sent multiple requests, requests flood the webserver at the same time
− Webserver crashes / runs slow
− Designed to prevent access to e.g. a website // Stops legitimate requests being processed/serviced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe copyright, plagiarism

A

Copyright
− law/legislation that requires permission to use intellectual property / other people’s work

Plagiarism
− To claim other’s work as your own
− To use other people’s work without consent / acknowledgement
− Theft of intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accidental loss of data and prevention

A

Lost from

  • Human error, accidentally deleting file
  • Hardware failure
  • Power failure or surge
  • Physical damage, fire or flood
  • Misplacing storage device

Prevention

  • Back up data regularly
  • Use surge protection and UPS
  • Keep data in protective case
  • Use verification method for deleting file
  • Follow and educate on correct procedure of ejecting files, saving, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Internet risks

A
  • Phishing
  • Pharming
  • Spyware
  • Dos
  • Malware
  • Viruses
  • Worm
  • Rootkit
  • Backdoor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to minimise risk of spyware

A

Anti-spyware

  • Scans computer for spyware
  • Removes/quarantines any spyware found
  • Prevent spyware from being installed

Onscreen keyboard

  • Key-logger can’t collect data of key press
  • Can’t relay useful info to 3rd party

2 Factor Authentication

  • Extra data sent to device
  • Harder for hacker to obtain data
  • Data has to be entered into same system if entered from remote location not accepted

Firewall

  • Can be software or hardware based
  • Monitors incoming and outgoing traffic
  • Allows criteria to be set
  • Blocks access to signal that do not meet criteria
  • Restricts access to specific applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How to minimise risk of virus

A

Anti-virus

  • Scans computer for viruses daily
  • Has a record of known viruses
  • Removes/Quarantines any virus found
  • Warns user of virus
  • Checks data before downloaded
  • Prevents download of virus found

Firewall/Proxy server

  • Monitors incoming and outgoing traffic
  • Allows setting of criteria
  • Checks if traffic meets criteria
  • Blocks traffic that does not meet criteria
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How to minimise risk of hacking

A

Firewall/Proxy server

  • Monitors incoming and outgoing traffic
  • Allows setting of criteria
  • Checks if traffic meets criteria
  • Blocks traffic that does not meet criteria

Passwords

  • Use long and more random passwords
  • Change it regularly
  • Lock after a set attempts

Biometrics

  • Data needed to enter is unique to individual
  • Hard to replicate
  • Lock after set attempts

2 Factor Authentication

  • Extra data sent to device
  • Hard for hacker to obtain
  • Data entered needs to be in the same system, if attempted from remote location it’s not accepted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe Phishing and Pharming

A

Phishing
− Legitimate looking email sent to user
− encourages user to click a link that directs user to a fake website
− User encouraged to enter personal details into a fake website // designed
to obtain personal details from a user

Pharming
− Malicious code/malware is downloaded without users’ knowledge
− That re-directs user to fake website (when legitimate URL entered)
− User encouraged to enter personal details into a fake website
− Designed to obtain personal and sensitive details from a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe free software, freeware, shareware

A
Free software- 
• Type of software licence 
• Free of charge 
• Normally distributed without the source code 
• Can legally share / copy 
• Cannot legally modify code 
• Cannot resell

Freeware- Owner has copyright for software but can be given away for free

Shareware- Often a trial version of full software, fee required for full access

17
Q

Copyright

A
  • Legal protection person can obtain to provide protection against their work stolen
18
Q

Identify and describe risks to a device when accessing the internet

A

Hacking
− When a person tries to gain unauthorised access to a computer system
− Data can be deleted/corrupted by hacker

Malware
− A software program designed to damage data / disrupt the computer system
− Replicates itself and fills the hard disk

Virus
− A program that replicates itself to damage/delete files

19
Q

What are ethics

A
  • A set of guidelines
  • Rules that govern the use of computers
  • Tell people how to behave when using computers
  • Could be subjected to plagiarism/intellectual property theft
  • Could copyright their work to make it illegal to copy or steal it
20
Q

Describe Cracking

A

-When someone alters a program source code usually for a backdoor (by disabling computer security software)