Question | Answer |
What is 'Phishing'? | Imitating companies to trick people into giving you bank details and other important information, normally via email. |
What is 'Malware'? | Malicious software intended to damage computers, steal data from them and even take control of them. |
What is 'Social Engineering'? | Taking advantage of human error to steal account details and passwords. |
What is 'Shoulder Surfing'? | Looking over someone entering their passwords or PIN numbers to gain access to their accounts. |
What is a 'Brute Force Attack'? | When a hacker uses a computer to go through many passwords in order to gain access to an account, this is why passwords need to be thought about a lot. |
How do cyber criminals take advantage of technical weaknesses of computers? | They use Malware like viruses and worms, they intercept data and the use Denial of Service (DoS) attacks. |
How do viruses transmit themselves? | They can be found on suspicious download links on the internet, they can be found in links given in phishing emails and they are also found in USB sticks left by criminals to infect companies. |
What are 'Worms'? | They are a type of malware that are a standalone program so they don't need to attach to other programs in order to spread, instead they scan the internet looking for vulnerable targets to infect. |
How do cyber criminals intercept data? | By 'eavesdropping' which is when cyber criminals intercept data as it moves across networks, it is the modern day version of wiretapping. |
Why is it necessary to be careful with mobile phones? | Because they are vulnerable due to their lack of security and the amount of important data stored on mobile phones. |
What are white, grey and black hat hackers? | White Hat - Hackers employed by companies to point out security flaws in their networks Black Hat - Malicious hackers who use their skills to gain money illegally Grey Hat - Hackers who point out flaws to companies without their permission, they sometimes blackmail companies for money though. |
What is 'Network Forensics'? | This is a way of finding peoples internet activity in order to find evidence of illegal activities. |
What is a 'firewall'? How is it useful? | This is software that checks data coming into a network or computer and either blocks it or allows it depending on the settings put on the firewall. This acts as a barrier between hackers, networks and the internet for your network and computer. |
What are 'user access levels'? How do they keep networks secure? | These are the levels of access set for users, administrators can access more important and secured information wheras guest users cannot. This stops people from damaging data and software while accessing networks. |
What is a 'proxy' server? How is it useful? | It is is a computer that acts as an intermediary between a web browser and the Internet. It helps to improve web performance by storing a copy of frequently used web pages. They are normally used in companies. They filter web content and malware so they are like a firewall. |
Hows is 'https' secure? | The 's' in it stands for secure because it is a encrypted data connection to a network, this is why there is a padlock symbol there too. |
What are 'audit trails'? How can you recover stolen data using them? | Audit trails are another name for data about who accessed data, what they did, when they did it and other vital data for investgigations on data theft. This info will be found if the data stolen is commonly recorded. |
What is the most commonly used password? Why is it bad? | The most commonly used password is 'password1'. This password is bad because it can be broken by a brute force attack on a standard PC in about 1 second. It is also so common and stupid that someone could hack it just by trying random passwords. |
What are the three types of system software? | The three types of system software are: Operating systems Utility programs Program translators |
What does an 'operating system(OS)' do? | It controls a computer's hardware and provides an interface for the user. |
What does an OS manage? | It manages: Memory Multitasking Peripherals Files User Access Aights |
What types of 'user interfaces' are there? | There are: Graphical User Interfaces (GUIs) Menu-Driven Interfaces Command Line Interfaces (CLIs) (Uses text only) Voice Activated Interfaces Real-Time Interfaces Windows, Icons, Menus and Pointers Interfaces (WIMPs) |
What are utilities? | They provide extra functions for the OS making it easier to use and more useful. They are small programs with their own specific function within the OS. |
How does 'Disk Defragmentation' work and what does it do? | Disk Defragmentation is used when a file is split into fragments because it is too big, when a file is fragmented it takes up more space and takes longer to reads. Defragmentation is used to reorder the files so they aren't taking up free space and are next to their own files. |
Want to create your own Flashcards for free with GoConqr? Learn more.