1/57
Section 3
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is computer security?
Computer security is the set of activites involving the identifying, assessing and managing of vulnerabilities,threats and attacks on a computer systems and data.
What is computer misuse?
Computer misuse is any activity in which the computer or its data is accessed, modified or deleted without authorization
What is cybersecurity?
Computer security is the set of activites involving the identifying, assessing and managing of vulnerabilities, threats, and attacks originating from cyberspace
Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorised access.
State ONE similarity and ONE difference between Computer Security and Cybersecurity
Similarity: Both focus on protecting information and systems.
Difference: Computer security is more inward-looking and focuses on protecting local computer systems under your control, while cybersecurity is outwards and addresses threats from the internet / network connected computers
What are the FOUR main elements of computer security?
Vulnerability, Threat, Attack, Countermeasure
TRUE or FALSE: A firewall can be both a hardware and software component
TRUE
What is the purpose of a firewall?
Firewalls monitor a network, blocking dangerous content such as viruses
What does the term ‘vulnerability’ mean?
The exposure to the possibility of being attacked or harmed.
Define the term ‘threat’
A statement of intention to inflict harm/damage
What term is defined as the ‘actual action that causes harm or damage’?
Attack
What is a ‘countermeasure’?
An action taken to counteract a threat
What sort of countermeasures might you put in place to prevent physical access to a computer room?
Security Personnel
Biometric System
Access Control Systems
Padlock
CCTV Monitoring
Facial Recognition
‘Man traps’ - one door must be closed before the next opens.
State at least TWO ways an individual can misuse a computer
Identity Theft
Cyberbullying
Phishing Attacks
Violation of Privacy
What is a phishing attack?
A type of cyber attack that involves tricking individuals into providing sensitive information, such as usernames, passwords, or credit card details, often through deceptive emails or websites.
Define the term ‘software piracy’
The unauthorized copying, distribution, or use of software, violating copyright laws and licensing agreements.
Software piracy refers to the illegal reproduction and distribution of software, typically to avoid purchasing legitimate copies.
What is ‘industrial espionage’?
The unauthorised access to confidential information or trade secrets of a business for competitive advantage, often involving theft or deceit.
Explain a DOS attack
A Denial of Service (DOS) attack is a malicious attempt to disrupt the normal functioning of a targeted server, service, or network by overwhelming it with a flood of traffic or sending it malformed requests, rendering it inaccessible to legitimate users.
Define ‘electronic eavesdropping’
The act of secretly listening to private conversations or intercepting electronic communications without the consent of the parties involved.
Suggest how electronic eavesdropping would be useful to law enforcement
It allows law enforcement to gather evidence and monitor criminal activities by intercepting communications, which can provide critical information for investigations and intelligence.
What is ‘propoganda’ in simple terms?
The spreading of false or misleading information to influence public opinion or promote a particular agenda.
What is ‘espionage’?
The practice of spying or of using spies, typically by governments to obtain political and military information.
List 5 common computer systems may be misused by individuals:
Cyberbullying
Online Publication of Obscene materials
Phishing Attacks
Violation of Privacy
Credit Card Fraud
Identity Theft
What is ‘cyberbullying’?
A form of bullying/harassment done using an online space. It involves the sending, posting or sharing of negative, harmful, false or mean content about someone else to cause embarrassment/humiliation.
Suggest THREE possible platforms where cyberbullying can take place
Gaming Platforms
Short Messaging Service (SMS)
Social Media Sites
Suggest three features of a phishing email that may cause the recipient to become suspicious
An urgent response is demanded
Grammar errors
Suspicious sender address
What is a ‘cookie’?
A piece of data sent from a website to a user’s computer and is stored by the user’s web browser while the user is browsing.
What is ‘malware’?
Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.
State 2 ways malware may gain entry to a computer system
Physically to a system through a USB drive or other external storage device
The Internet - visiting unsafe websites
Phishing attacks - downloading infected email attachments
What is a trojan?
A type of malware included with a legitimate program and activated following installation. Trojans steal usernames and passwords
Differentiate between how a worm and a virus operates
A worm is a standalone malware that replicates itself to spread across networks, often without user action, while a virus attaches itself to legitimate files and requires user interaction to be activated and propagate.
List 3 physical security measures to mitigate threats on a computer system
Secure location
Security personnel
Electronic Access systems
Equipment Locks
Fireproof and waterproof storage
List 3 software security measures to mitigate threats on a computer system
Antivirus software
Firewalls
Intrusion Detection Systems
Operating System updates
Encryption
List 3 personal security practices to mitigate threats on a computer system
Strong passwords
Make regular backups
Dont join open WiFi networks
Keep track of where your mobile devices are
Use two-factor authentication
Regularly update software
Monitor accounts for suspicious activity
Awareness of phishing scams
State how automation can impact jobs negatively (job loss)
Automation can lead to job displacement as machines and software can perform tasks traditionally done by humans, resulting in reduced employment opportunities and potential skill mismatches in the workforce.
Describe ONE negative impact that information Technology has had on a medical professional
Staff has to be retrained to use new technology programs, which can take time away from patient care and potentially lead to errors during the transition.
State the role of a Network Engineer
Responsible for the design and implementation of computer networks : LANs, MANs and WANs
What is the role of a computer programmer?
Computer programmers write software based on specifications, provide documentation and maintain software
What network professional Oversees activities related to the design and development of new information systems.
Systems Analyst.
What does a Computer Support Specialist do?
Assists users with technical issues, maintains computer systems, and provides support for hardware and software problems.
State the role of a Network Administrator
Responsible for the day-to-day smooth running of an organization’s network
Who is a system administrator?
A system administrator is a computer professional who is responsible for the day-to-day running and management of computer systems. They install and update software and ensure the system is secure.
What is the role of a database administrator?
Responsible for designing and maintaining an organisation's databases.
What does a software developer do?
A software developer develops the program specifications that programmers work from
Who is a web developer?
A professional who takes a web design from a client and turns it into an operational website.
What does a social media specialist do?
Responsible for planning and implementing a company’s social media strategy and output.
List three ways in which computers are being used in the classroom today
Computers are used for interactive learning, to access educational resources online, and for collaborative projects among students.
When computers are used as teaching aids, it is knows as?
Computer Aided Instruction (CAI) or Computer Aided Learning (CAL)
How are computers used for commerce?
Computers in commerce enable online shopping, streamline supply chain management, and facilitate electronic payment systems (EPOS = Electronic point of sale), stock-keeping
What is telemedicine?
Telemedicine refers to the use of telecommunications technology to provide medical care and consultation remotely. It allows healthcare professionals to diagnose and treat patients from a distance, improving access to medical services.
Briefly discuss Information Technology’s effect on Recreation
Gaming - networking and digital music production.
Film - online streaming services and film distribution.
Social media - access to communities and sharing of experiences.
Music - MIDI systems, online streaming platforms