Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
18 Cards in this Set
- Front
- Back
What is Hacking? |
Hacking is the act of gaining illegal access to a computer system |
|
What are the possible effects of Hacking? |
1. Hacking can lead to identity theft or gaining personal information 2. Data can be deleted, changed or corrupted |
|
How can we protect against Hacking? |
1. Use a Firewall 2. Use strong passwords and user ids 3. Use anti-hacking software. |
|
What are viruses? |
Viruses are program or program code that can replicate/copy itself with the intention of deleting or corrupting files, or cuase the computer to malfunction |
|
What are the possible effects of viruses? |
1. Viruses can cause the computer to crash, stop functioning normally or become unresponsive 2. Viruses can delete files/data 3. Viruses can cprrupt files/data |
|
How can we stop viruses? |
1. Install anti-virus software 2. Don't use software from unknown sources 3. Becareful when opening emails/attachments from unknown senders |
|
What is phishing? |
Phishing is when the creator sends out a legitimate-looking email, as soon as the recipient clicks on a link in the email/attachment, the user is sent to a fake/bogus website |
|
What are the possible effect of phishing? |
1. The creater of the email can gain personal data such as bank account numbers from users when they visit the fake website 2. This can lead to fraud or identity theft |
|
How can we prevent/avoid phishing? |
1. Many ISPs filter out phishing emails 2. The user should always be cautious when opening emails or attachments |
|
What is pharming? |
Pharming is malicious code installed on a user's hard drive or on the web server; the code will redirect the user to a fake/bogus website without their knowledge |
|
What are the possible effect of pharming? |
1. The creator of the malicious code can gain personal data such as bank account numbers from users when they visit the fake website 2. This can lead to fraud or identity theft |
|
How can we prevent pharming? |
1. Some anti-spyware software can identify and remove the pharming code from the hard drive 2. The user should always be alert and look out for clues that they are being redirected to another webside |
|
What is wardriving? |
Wardriving is the act of locating and using wireless internet connections illegally; it only requires a laptop (or other portable device), a wireless network card and an wireless network card and an antenna to pick up wireless signals |
|
What are the effect of wardriving? |
1. It is possible to steal a user's internet time/ allocation by downloading large files (e.g. movie files) 2. It is possible to hack into the wireless network and steal a user's password and other personal details |
|
How can we prevent wardriving? |
1. Use of wired equivalent privacy (WEP) encryption 2. Protect use of the wireless device by having complex passwaords before the internet can be accessed 3. Use of firewalls to prevent outside users from gaining access |
|
What is Spyware/key-logging software? |
Software that gathers information by monitoring key presses on the user's keyboard; the information is then sent back to the person who sent the software |
|
Whar are the effect of Spyware/key-logging software? |
1. Spyware/key-logging software gives the originator access to all data entered using a keyboard on the user's computer 2. The software is able to install other spyware real cookie data and also change a user's default web browser |
|
How can we prevent Spyware/key-logging software? |
1. Use of anti-spyware software 2. The user should always be alert and look out for clues that their keyboard activity is beingmonitored 3. Using a mouse to select characters from passwords (etc.) rather than typing them in using a keyboard can help reduce the risk |