• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/33

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

33 Cards in this Set

  • Front
  • Back

Define 'hacking'

The act of gaining illegal access to a computer system.

What are some effects of hacking

Identity theft


Data deletion/corruption

What are some ways to prevent hackers from gaining access to your data

Firewalls, strong passwords, ensuring that important communications are encrypted

Define 'Virus'

A program that can replicate itself with the intention of deleting or corrupting files

What are some effects of viruses

Computer crashing


Data deletion/corruption

What are some ways to prevent viruses

Anti-virus


Not downloading software from untrusted sources

Define 'phishing'

The act of gaining someone's personal information by sending a fraudulent email pretending to be from a trusted company asking for personal information

What are some effects of phishing

Identity theft


Exposed personal information

Define 'Pharming'

Malicious code installed on a web server or the user's hard drive that re-directs users to Zeus sites so their personal information can be stolen.

What are some effects of Pharming

Identity theft


Exposed personal information

Define 'Wardriving'

The act of illegally gaining information through WiFi points.

What are some effects of wardriving

Exposed personal data


Used up bandwidth

What are some ways to prevent Wardriving

Secure Wifi Password


WPA2


Whitelisting certain MAC Addresses

Define 'Spyware'

Software that gathers information by monitoring key presses on the target's keyboard

What are some effects of Spyware

Give the criminal access to everything you type:


Passwords, usernames, etc.

What are some ways to prevent Spyware

Anti-spyware software


Using a mouse to type important information

What are Cookies?

Cookies are little packets of information stored on your browser about previous viewing history or e-commerce purchases.

What do Cookies NOT contain

Personal information:


Passwords, Usernames, Credit card details

How do sites use Cookies?

Some websites use Cookies to help give better recommendations for things to buy/watch.

How can accidental file deletion be prevented?

Regular back-ups


Save data regularly


Limit access rights for some users

How can hardware failure be prevented?

Regular back-ups


Un-interrupted Power Supply


Use of parallel systems

How can software failure's effects be minimized?

Regular back-ups


Saving regularly

Define 'Firewall'

A firewall sits between the user's computer and an external network (internet).

What are some tasks carried out by Firewalls

Examines traffic


Checks if incoming & outgoing data meets requirements


Blocking untrusted data


Logging traffic

Define Proxy Server

Proxy servers act as the intermediary between a user's computer and a web server

What are some tasks carried out by a Proxy Server?

Filters traffic


Uses cache to speed things up


Keeps the user's IP address secret


Can act as firewall

What does SSL stand for?

Secure Sockets Layer

Define SSL

SSL is a type of protocol that encrypts data sent over the internet.

What does TLS stand for?

Transport Layer Security

Define TLS

TLS is a type of protocol that encrypts data sent over the internet.

Why do most sites use SSL?

Backwards compatibility

What are the main differences between SSL and TLS?

TLS can be extended by adding new Authentication methods


TLS can make use of session caching


TLS separates the handshake protocol from the record protocol

What is the main difference between Asymmetric encrypting and Symmetric encryption

Asymmetric encryption is better


Asymmetric encryption uses Public and Private keys