Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
33 Cards in this Set
- Front
- Back
Define 'hacking' |
The act of gaining illegal access to a computer system. |
|
What are some effects of hacking |
Identity theft Data deletion/corruption |
|
What are some ways to prevent hackers from gaining access to your data |
Firewalls, strong passwords, ensuring that important communications are encrypted |
|
Define 'Virus' |
A program that can replicate itself with the intention of deleting or corrupting files |
|
What are some effects of viruses |
Computer crashing Data deletion/corruption |
|
What are some ways to prevent viruses |
Anti-virus Not downloading software from untrusted sources |
|
Define 'phishing' |
The act of gaining someone's personal information by sending a fraudulent email pretending to be from a trusted company asking for personal information |
|
What are some effects of phishing |
Identity theft Exposed personal information |
|
Define 'Pharming' |
Malicious code installed on a web server or the user's hard drive that re-directs users to Zeus sites so their personal information can be stolen. |
|
What are some effects of Pharming |
Identity theft Exposed personal information |
|
Define 'Wardriving' |
The act of illegally gaining information through WiFi points. |
|
What are some effects of wardriving |
Exposed personal data Used up bandwidth |
|
What are some ways to prevent Wardriving |
Secure Wifi Password WPA2 Whitelisting certain MAC Addresses |
|
Define 'Spyware' |
Software that gathers information by monitoring key presses on the target's keyboard |
|
What are some effects of Spyware |
Give the criminal access to everything you type: Passwords, usernames, etc. |
|
What are some ways to prevent Spyware |
Anti-spyware software Using a mouse to type important information |
|
What are Cookies? |
Cookies are little packets of information stored on your browser about previous viewing history or e-commerce purchases. |
|
What do Cookies NOT contain |
Personal information: Passwords, Usernames, Credit card details |
|
How do sites use Cookies? |
Some websites use Cookies to help give better recommendations for things to buy/watch. |
|
How can accidental file deletion be prevented? |
Regular back-ups Save data regularly Limit access rights for some users |
|
How can hardware failure be prevented? |
Regular back-ups Un-interrupted Power Supply Use of parallel systems |
|
How can software failure's effects be minimized? |
Regular back-ups Saving regularly |
|
Define 'Firewall' |
A firewall sits between the user's computer and an external network (internet). |
|
What are some tasks carried out by Firewalls |
Examines traffic Checks if incoming & outgoing data meets requirements Blocking untrusted data Logging traffic |
|
Define Proxy Server |
Proxy servers act as the intermediary between a user's computer and a web server |
|
What are some tasks carried out by a Proxy Server? |
Filters traffic Uses cache to speed things up Keeps the user's IP address secret Can act as firewall |
|
What does SSL stand for? |
Secure Sockets Layer |
|
Define SSL |
SSL is a type of protocol that encrypts data sent over the internet. |
|
What does TLS stand for? |
Transport Layer Security |
|
Define TLS |
TLS is a type of protocol that encrypts data sent over the internet. |
|
Why do most sites use SSL? |
Backwards compatibility |
|
What are the main differences between SSL and TLS? |
TLS can be extended by adding new Authentication methods TLS can make use of session caching TLS separates the handshake protocol from the record protocol |
|
What is the main difference between Asymmetric encrypting and Symmetric encryption |
Asymmetric encryption is better Asymmetric encryption uses Public and Private keys |