Cyberspace and Network Security 🔐

0.0(0)
studied byStudied by 2 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/36

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

37 Terms

1
New cards

Cyber crime

using a computer to commit a crime

2
New cards

Hacking

gaining unauthorised access to computer system with intention of corrupting and stealing data or other illegal purposes

<p>gaining unauthorised access to computer system with intention of corrupting and stealing data or other illegal purposes</p>
3
New cards

Pornography

often used to hide malware when downloaded or the distribution of illegal forms

4
New cards

Cyber stalking

online stalking; repeatedly using computer to frighten or harass others e.g inappropriate comments

<p>online stalking; repeatedly using computer to frighten or harass others e.g inappropriate comments</p>
5
New cards

Data theft

illegal copying or taking of personal data with the intent of gaining confidential information, used for identity fraud e.g passport applications

<p>illegal copying or taking of personal data with the intent of gaining confidential information, used for identity fraud e.g passport applications</p>
6
New cards

Denial of service (DoS)

attack to prevent network from functioning by flooding it with useless traffic, users are unable to access

7
New cards

Digital forgery

intentionally creating falsely altered files or documents with intent of misleading others e.g qualifications

8
New cards

Cyber defamation

intentionally damaging reputation of person or organisation with false information over the internet

9
New cards

Spamming

bulk sending unsolicited messages to large numbers of internet users indiscriminately to overload their inbox

<p>bulk sending unsolicited messages to large numbers of internet users indiscriminately to overload their inbox </p>
10
New cards

Phishing

Sending emails, appearing to be from reputable companies, to persuade people to disclose private information e.g fake hyperlinks

<p>Sending emails, appearing to be from reputable companies, to persuade people to disclose private information e.g fake hyperlinks</p>
11
New cards

Malware

malicious software downloaded onto someone’s computer and designed to gain access to or damage it

<p>malicious software downloaded onto someone’s computer and designed to gain access to or damage it</p>
12
New cards

Virus

  • gains access to device and replicates, attaching onto other files to hide

  • can copy personal data, delete files or slow down devices when a condition is met

13
New cards

Trojan horse

  • gains entry in ‘disguise’ by misleading users of its true intentions

  • tricks into downloading/ installing program that does serious damage

14
New cards

Worm

  • spreads by replicating itself but works on its own without a host program/ file

  • requires bandwidth causing slower data transmission speeds

15
New cards

Keylogger

  • records keystrokes performed by user to steal personal information

  • saves as file and sends to hacker secretly

16
New cards

Spyware

  • secretly installed on computer

  • tracks user activities to gather personal information e.g bank details

17
New cards

Protecting networks

using encryption, passwords, levels of access, backup and firewalls

<p>using encryption, passwords, levels of access, backup and firewalls</p>
18
New cards

Encryption

using special software to encode or ‘scramble’ data with a key before transmission so it’s unreadable if intercepted

<p>using special software to encode or ‘scramble’ data with a key before transmission so it’s unreadable if intercepted</p>
19
New cards

Encryption key

used to unscramble data when arriving at destination

<p>used to unscramble data when arriving at destination</p>
20
New cards

Why use encryption

  • Helps identify authentic users

  • Prevents alteration of message

  • Prevents unauthorised users from reading message

21
New cards

Usernames and passwords

users are allocated unique ID and password which is checked against database when logging on

<p>users are allocated unique ID and password which is checked against database when logging on</p>
22
New cards

Secure passwords

weak passwords are easy to guess so should have mix of letters, numbers and special characters

<p>weak passwords are easy to guess so should have mix of letters, numbers and special characters</p>
23
New cards

Updating passwords

must be regularly updated to enhance security and accounts can be disabled after unsuccessful attempts

24
New cards

Access levels

different levels linked to user ID which can be ‘read only’, ‘read and copy’ or ‘read and write’

25
New cards

Why use access levels

prevents unauthorised users accessing or altering sensitive information they don’t need

26
New cards

Backups

used to recover data when lost or corrupted by storing a copy that can be loaded, usually automatically scheduled

<p>used to recover data when lost or corrupted by storing a copy that can be loaded, usually automatically scheduled</p>
27
New cards

Firewalls

monitor and filter data entering or leaving networks by blocking what doesn’t comply with set rules

<p>monitor and filter data entering or leaving networks by blocking what doesn’t comply with set rules</p>
28
New cards

Data transfer

transmitting data from point to point easily over the internet, using a digital signal

29
New cards

How does data transfer work

files are stored on web server and can be accessed by any computer using an internet connection, although not very secure so we use transfer protocols

30
New cards

Communication protocols

agreed standards of rules for sending or receiving data on network, managing its speed, size and error checking

<p>agreed standards of rules for sending or receiving data on network, managing its speed, size and error checking</p>
31
New cards

Packet switching

data packets travel between computers from one router to the next

32
New cards

File transfer protocol (FTP)

uses data encryption, allowing users to download or upload files from web servers securely over internet

33
New cards

Hypertext transfer protocol (http)

used by WWW to transfer webpages over the internet, defining how messages are formatted and transmitted

34
New cards

How are webpages requested

http sends command to web sever on behalf of user requesting webpage

35
New cards

If webpage can’t be located

will report an error e.g 404 page not found

36
New cards

Hypertext transfer protocol secure (https)

uses secure socket layer (SSL) to ensure data is transmitted securely via encryption

37
New cards

Indicator of https

padlock icon displayed on screen, mainly in financial applications