• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/18

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

18 Cards in this Set

  • Front
  • Back

What is Hacking?

Hacking is the act of gaining illegal access to a computer system

What are the possible effects of Hacking?

1. Hacking can lead to identity theft or gaining


personal information


2. Data can be deleted, changed or corrupted

How can we protect against Hacking?

1. Use a Firewall


2. Use strong passwords and user ids


3. Use anti-hacking software.

What are viruses?

Viruses are program or program code that can replicate/copy itself with the intention of deleting or corrupting files, or cuase the computer to malfunction

What are the possible effects of viruses?

1. Viruses can cause the computer to crash, stop


functioning normally or become unresponsive


2. Viruses can delete files/data


3. Viruses can cprrupt files/data

How can we stop viruses?

1. Install anti-virus software


2. Don't use software from unknown sources


3. Becareful when opening emails/attachments


from unknown senders

What is phishing?

Phishing is when the creator sends out a legitimate-looking email, as soon as the recipient clicks on a link in the email/attachment, the user is sent to a fake/bogus website

What are the possible effect of phishing?

1. The creater of the email can gain personal


data such as bank account numbers from


users when they visit the fake website


2. This can lead to fraud or identity theft

How can we prevent/avoid phishing?

1. Many ISPs filter out phishing emails


2. The user should always be cautious when


opening emails or attachments

What is pharming?

Pharming is malicious code installed on a user's hard drive or on the web server; the code will redirect the user to a fake/bogus website without their knowledge

What are the possible effect of pharming?

1. The creator of the malicious code can gain


personal data such as bank account numbers


from users when they visit the fake website


2. This can lead to fraud or identity theft

How can we prevent pharming?

1. Some anti-spyware software can identify and


remove the pharming code from the hard


drive


2. The user should always be alert and look out


for clues that they are being redirected to


another webside



What is wardriving?

Wardriving is the act of locating and using wireless internet connections illegally; it only requires a laptop (or other portable device), a wireless network card and an wireless network card and an antenna to pick up wireless signals

What are the effect of wardriving?

1. It is possible to steal a user's internet time/


allocation by downloading large files (e.g.


movie files)


2. It is possible to hack into the wireless network


and steal a user's password and other


personal details

How can we prevent wardriving?

1. Use of wired equivalent privacy (WEP)


encryption


2. Protect use of the wireless device by having


complex passwaords before the internet


can be accessed


3. Use of firewalls to prevent outside users


from gaining access





What is Spyware/key-logging software?

Software that gathers information by monitoring key presses on the user's keyboard; the information is then sent back to the person who sent the software

Whar are the effect of Spyware/key-logging software?

1. Spyware/key-logging software gives the


originator access to all data entered using a


keyboard on the user's computer


2. The software is able to install other spyware


real cookie data and also change a user's


default web browser

How can we prevent Spyware/key-logging software?

1. Use of anti-spyware software


2. The user should always be alert and look


out for clues that their keyboard activity is


beingmonitored


3. Using a mouse to select characters from


passwords (etc.) rather than typing them in


using a keyboard can help reduce the risk