Cyberspace and Network Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/33

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

34 Terms

1
New cards

Cyber crime

using a computer to commit a crime

2
New cards

Hacking

gaining unauthorised access to computer with intention of corrupting or stealing data

<p>gaining unauthorised access to computer with intention of corrupting or stealing data</p>
3
New cards

Pornography

often used to hide malware when downloaded

4
New cards

Cyber stalking

repeatedly using computer to frighten or harass others e.g inappropriate comments

<p>repeatedly using computer to frighten or harass others e.g inappropriate comments</p>
5
New cards

Data theft

illegal copying or taking of personal data, used for identity fraud e.g passport applications

<p>illegal copying or taking of personal data, used for identity fraud e.g passport applications</p>
6
New cards

Denial of service

attack to prevent network from functioning by flooding it with useless traffic

7
New cards

Digital forgery

intentionally creating falsely altered files or documents e.g qualifications

8
New cards

Cyber defamation

intentionally damaging reputation of person or organisation through digital media

9
New cards

Spamming

sending the same ‘junk’ electronic messages indiscriminately to overload someones inbox

<p><span>sending the same ‘junk’ electronic messages indiscriminately to overload someones inbox</span></p>
10
New cards

Phishing

Sending emails, appearing to be from reputable companies to gain personal information e.g fake hyperlinks

<p><span>Sending emails, appearing to be from reputable companies to gain personal information e.g fake hyperlinks</span></p>
11
New cards

Malware

malicious software downloaded onto computer unintentionally using internet

<p>malicious software downloaded onto computer unintentionally using internet</p>
12
New cards

Virus

  • gains access to device and replicates, attaching onto other files to hide

  • can copy personal data, delete files or slow down devices when a condition is met

13
New cards

Trojan horse

  • gains entry in ‘disguise’ by misleading users of its true intentions

  • tricks into downloading/ installing program that does serious damage

14
New cards

Worm

  • spreads by replicating itself but works on its own

  • requires bandwidth causing slower data transmission speeds

15
New cards

Keylogger

  • records keystrokes performed by user to steal personal information

  • saves as file and sends to hacker secretly

16
New cards

Spyware

  • secretly installed on computer

  • tracks user activities to gather personal information e.g bank details

17
New cards

Protecting networks

using encryption, passwords, levels of access, backup and firewalls

<p>using encryption, passwords, levels of access, backup and firewalls</p>
18
New cards

Encryption

using special software to encode or ‘scramble’ data with a key before transmission so it’s unreadable if intercepted

<p>using special software to encode or ‘scramble’ data with a key before transmission so it’s unreadable if intercepted</p>
19
New cards

Encryption key

used to unscramble data when arriving at destination

<p>used to unscramble data when arriving at destination</p>
20
New cards

Why use encryption

  • Helps identify authentic users

  • Prevents alteration of message

  • Prevents unauthorised users from reading message

21
New cards

Usernames and passwords

users are allocated unique ID and password which is checked against database when logging on

<p>users are allocated unique ID and password which is checked against database when logging on</p>
22
New cards

Secure passwords

weak passwords are easy to guess so should have mix of letters, numbers and special characters

<p>weak passwords are easy to guess so should have mix of letters, numbers and special characters</p>
23
New cards

Updating passwords

must be regularly updated to enhance security and accounts can be disabled after unsuccessful attempts

24
New cards

Access levels

different levels linked to user ID which can be ‘read only’, ‘read and copy’ or ‘read and write’

25
New cards

Why use access levels

prevents unauthorised users accessing or altering sensitive information they don’t need

26
New cards

Backups

used to recover data when lost or corrupted by storing a copy that can be loaded, usually automatically scheduled

<p>used to recover data when lost or corrupted by storing a copy that can be loaded, usually automatically scheduled</p>
27
New cards

Firewalls

monitor and filter data entering or leaving networks by blocking what doesn’t comply with set rules

<p>monitor and filter data entering or leaving networks by blocking what doesn’t comply with set rules</p>
28
New cards

Communication protocols

agreed standards of rules for sending or receiving data on network

<p>agreed standards of rules for sending or receiving data on network</p>
29
New cards

File transfer protocol (FTP)

uses data encryption, allowing users to download or upload files from web servers securely over internet

30
New cards

Hypertext transfer protocol (http)

used by WWW to transfer webpages over the internet, defining how messages are formatted and transmitted

31
New cards

How are webpages requested

http sends command to web sever on behalf of user requesting webpage

32
New cards

If webpage can’t be located

will report an error e.g 404 file not found

<p>will report an error e.g 404 file not found</p>
33
New cards

Hypertext transfer protocol secure (https)

uses secure socket layer (SSL) to ensure data is transmitted securely via encryption

34
New cards

Indicator of https

padlock icon displayed on screen, mainly in financial applications