1/33
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Cyber crime
using a computer to commit a crime
Hacking
gaining unauthorised access to computer with intention of corrupting or stealing data
Pornography
often used to hide malware when downloaded
Cyber stalking
repeatedly using computer to frighten or harass others e.g inappropriate comments
Data theft
illegal copying or taking of personal data, used for identity fraud e.g passport applications
Denial of service
attack to prevent network from functioning by flooding it with useless traffic
Digital forgery
intentionally creating falsely altered files or documents e.g qualifications
Cyber defamation
intentionally damaging reputation of person or organisation through digital media
Spamming
sending the same ‘junk’ electronic messages indiscriminately to overload someones inbox
Phishing
Sending emails, appearing to be from reputable companies to gain personal information e.g fake hyperlinks
Malware
malicious software downloaded onto computer unintentionally using internet
Virus
gains access to device and replicates, attaching onto other files to hide
can copy personal data, delete files or slow down devices when a condition is met
Trojan horse
gains entry in ‘disguise’ by misleading users of its true intentions
tricks into downloading/ installing program that does serious damage
Worm
spreads by replicating itself but works on its own
requires bandwidth causing slower data transmission speeds
Keylogger
records keystrokes performed by user to steal personal information
saves as file and sends to hacker secretly
Spyware
secretly installed on computer
tracks user activities to gather personal information e.g bank details
Protecting networks
using encryption, passwords, levels of access, backup and firewalls
Encryption
using special software to encode or ‘scramble’ data with a key before transmission so it’s unreadable if intercepted
Encryption key
used to unscramble data when arriving at destination
Why use encryption
Helps identify authentic users
Prevents alteration of message
Prevents unauthorised users from reading message
Usernames and passwords
users are allocated unique ID and password which is checked against database when logging on
Secure passwords
weak passwords are easy to guess so should have mix of letters, numbers and special characters
Updating passwords
must be regularly updated to enhance security and accounts can be disabled after unsuccessful attempts
Access levels
different levels linked to user ID which can be ‘read only’, ‘read and copy’ or ‘read and write’
Why use access levels
prevents unauthorised users accessing or altering sensitive information they don’t need
Backups
used to recover data when lost or corrupted by storing a copy that can be loaded, usually automatically scheduled
Firewalls
monitor and filter data entering or leaving networks by blocking what doesn’t comply with set rules
Communication protocols
agreed standards of rules for sending or receiving data on network
File transfer protocol (FTP)
uses data encryption, allowing users to download or upload files from web servers securely over internet
Hypertext transfer protocol (http)
used by WWW to transfer webpages over the internet, defining how messages are formatted and transmitted
How are webpages requested
http sends command to web sever on behalf of user requesting webpage
If webpage can’t be located
will report an error e.g 404 file not found
Hypertext transfer protocol secure (https)
uses secure socket layer (SSL) to ensure data is transmitted securely via encryption
Indicator of https
padlock icon displayed on screen, mainly in financial applications