ComSci - Unit 4

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/31

flashcard set

Earn XP

Description and Tags

Ethics and law, Database considerations, Cybersecurity

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

32 Terms

1
New cards

Social Engineering

When a web user is tricked psychologically into doing something dangerous online

2
New cards

Phishing

A form of social engineering that tricks users into revealing their personal info

3
New cards

Denial of service (DoS)

an attack aimed to disrupt online services by making them unavailable to users

4
New cards

Distributed Denial of Service (DDoS)

DoS attack that involves flooding a server with excessive traffic, often from multiple compromised devices

5
New cards

Backdoor Attack

gaining unauthorised access to a system by exploiting existing weaknesses and bypassing security measures

6
New cards

IP Spoofing

creation of IP packets with a false source IP address, with the purpose of impersonating another computer system

7
New cards

SQL Injection

Uses malicious SQL code for backend database manipulation to access info that was not intended to be displayed

8
New cards

Man-In-The-Middle (MITM)

secretly intercepts, relays and potentially alters the communications between two parties

9
New cards

Cross-Site Scripting (XSS)

XSS attacks allow injection of client-side scripts into web pages viewed by others, redirect users to websites where their data can be stolen

10
New cards

Zero-Day Vulnerabilities

Vulnerability in a computer system that is either unknown to it’s developers or unable to be fixed

11
New cards

Virus

Malware disguised as harmless that, when executed, produces copies of itself and inserts them into other programs or files

12
New cards

Worm

Malware that transmits itself over a network to infect other computers and does not require an executable code

13
New cards

Rootkits

Malware that modifies the host’s operating system so that malware is hidden from the user

14
New cards

Trojan

Malware that represents itself as a harmless/regular program to persuade a victim into installing it, and begins destructive function when application is opened

15
New cards

Ransomware

Malware that encrypts or locks files, preventing a user from accessing their files until a ransom has been paid

16
New cards

Adware

Malware that results in automated spam which bombards users with unwanted adverts, banners and pop-ups

17
New cards

Spyware

Malware that secretly collects personal info such as browsing data, passwords, PINs and payment info

18
New cards

Privacy Act 1988

Governs the handling of personal info by entities. Consists of 13 Aus Privacy Principles to to ensure individuals have more control about how their data is collected, used and disclosed

19
New cards

APP 11

Requires an APP entity to take active measures to ensure the security of personal info it holds, and to actively consider whether it is permitted to retain personal info

20
New cards

APP 11.1

An entity must take reasonable steps to protect personal info it holds from misuse, intereference, loss, as well as unauthorised access, modification and disclosure

21
New cards

APP 11.2

When an entity no longer needs personal info, the entity must take reasonable steps to destroy/de-identify the info

22
New cards

APP entity

An applicable entity under the Privacy Act, including public organisations and private sectors.

23
New cards

Privacy Amendment (Notifiable Data Breaches) Act 2017

Amended the Privacy Act 1988 to introduce mandatory data breach notification requirements for entities.

24
New cards

Analysis of log files

process of reviewing computer event logs to proactively identify bugs, security threats and other risks

25
New cards

Anti-Malware

Software designed for scanning, detecting, blocking and preventing malware from accessing a system

26
New cards

Firewall filtering

Controls the flow of data to and from a network by using ACLs to determine which packets are accepted or not

27
New cards

Access Control Lists (ACLs)

List of permissions that specify which users/processes are granted access to a resource as well as what operations are allowed

28
New cards

Intrusion Prevention Systems (IPSs)

monitors network traffic for potential threats and actively blocks and prevents attacks from reaching target

29
New cards

Virtual Private Networks (VPNs)

Network architecture that virtually extends a private network by encrypting your internet traffic and creating a “private tunnel”

30
New cards

User Training

educating users on how to effectively utilise a platform, tool or system

31
New cards

ICT Code of conduct

Outlines ethical guidelines and rules for responsible tech use and ensures safe, respectful and productive use of tech

32
New cards

Physical security

Protecting network infrastructure and hardware from unauthorised physical access, damage or tampering