1/75
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What is malware?
Any software which can harm a computer or user
What are viruses?
Small programs which aim to cause physical harm to a computer system
What does a standard virus do?
Hides in files or programs, replicates, and deletes data
What does a worm virus do?
Replicates itself and slows the computer
What does a trojan virus do?
Disguises as a useful program but causes harm in the background
What is the aim of spyware?
To spy on the user and collect their information
What does a key logger do?
Tracks every key a user hits to try identify their password
What might happen to information collected by spyware?
It may be sold to third parties for targeted advertising
What does adware do?
Downloads and displays unwanted adverts and collects marketing information
What does pharming malware do?
Changes DNS IP addresses to redirect users to fake websites
What is scareware?
Pop-ups that trick users into buying fake virus protection software
What does ransomware do?
Locks a computer and demands payment to unlock it
What is phishing?
Tricking users into giving away sensitive information by pretending to be a legitimate company
What is social engineering?
Manipulating people to make security-compromising mistakes
What is a brute force attack?
Trying thousands of password combinations to hack an account
What is the aim of a denial of service attack?
To crash a web server by overwhelming it with login attempts
What may criminals demand after a DoS attack?
Money in return for stopping the attack
What can hackers use to monitor and intercept network traffic?
Specialist hardware and packet sniffers
Why is encryption important?
Because it protects sensitive data from being intercepted and read
What is an SQL injection?
Adding or creating bits of code that act like variables to alter SQL statements
How can an SQL injection be used maliciously?
By bolting SQL onto a password to access other users’ accounts
What is penetration testing?
Simulating attacks to find weaknesses and improve system security
Why should networks monitor traffic?
To detect attacks and help identify how and by whom they were carried out
What is an Acceptable Use Policy?
A list of rules for network users to follow to maintain security
What might an AUP include?
Use complex passwords, restrict access, lock devices, and avoid unapproved downloads
What is a Backup Policy?
A plan for how, when, and where data should be backed up
What might a Backup Policy include?
Who backs up, backup frequency, and backup storage location
What is a Disaster Recovery Policy?
A plan for restoring systems after a failure or attack
What might a Disaster Recovery Policy include?
Responsible person, storage media, and recovery support organisations
What does anti-virus software do?
Finds and destroys viruses
Why must anti-virus software be up-to-date?
To remain effective against the latest threats
What does a firewall do?
Monitors data through ports and keeps them closed unless expected
What are user access levels?
Different access rights for users based on their role
Why are user access levels important?
To prevent unauthorised access to sensitive information
Why are passwords used on networks?
To block unauthorised access
What is a physical security measure for network rooms?
Locks with passcodes or biometrics
What are cameras and motion sensors used for in network security?
To monitor and prevent unauthorised access
What is system software?
Software that allows a computer to run and be maintained
What is the most important piece of software on a computer?
The operating system
What does the operating system control and communicate with?
The computer hardware
What else can the operating system communicate with?
The application that is running
What is the operating system often compared to?
A bridge between the hardware and the application
What is the kernel?
The core of the OS responsible for low-level hardware operations
What does each device register with the kernel?
Its driver file
What does a driver file contain?
Code allowing the OS to communicate with the device
What are the five main roles of an operating system?
Memory management, peripheral management, multi-tasking, security, user interface
How does the OS manage memory?
It loads applications into RAM and ensures each has enough space
What is virtual memory?
Memory the OS manages when RAM runs out
How does the OS manage peripherals?
By controlling access to devices attached to the computer
What is an interface?
A way for users to interact with a computer
What does a GUI use to control a computer?
Windows, icons, menus, and pointers
How does a menu-driven interface work?
By using menus to control the computer
How is a command line interface used?
Through written commands
Why is a command line interface efficient?
Because advanced users can operate it quickly
How does an OS enable multi-tasking?
By managing CPU processes so several programs can run
How can the OS manage multitasking processes?
By taking turns or finishing the shortest job first
How does the OS manage user data?
By ensuring each user’s data is private to themIn this way an OS provides security to users
What are utility programs?
Programs included in modern operating systems to perform useful functions
What are the three main purposes of utility programs?
Keep the system secure, organize storage, maintain the system
What does encryption software do?
Facilitates the encryption of data
What does formatting do to a storage device?
Prepares it for data storage by creating sectors, tracks, and a File Allocation Table (FAT)
What is the FAT used for?
To track where data is located on a storage device
What happens when you delete a file?
The computer marks the space as empty, but the data is still there
What size are the sectors on a hard disk?
512 bytes
How is data stored on a hard disk?
In 512-byte blocks that can become fragmented over time
What is fragmentation?
When data blocks are scattered across a hard drive, making reading slower
What does defragmentation software do?
Reorganizes fragmented files so related blocks are stored next to each other
What does compression software do?
Reduces the size of a file
What is backup software used for?
To create copies of data and store them elsewhere
What is a full backup?
A complete copy of all files on a system; slow but easy to restore
What is an incremental backup?
Only backs up files that have changed since the last backup; faster but harder to restore completely
What is a stakeholder?
A person or group affected by an issue
What does the Data Protection Act (2018) require companies to do?
What rights does the data subject have under the Data Protection Act?
To access, update, and delete data held about them
What does the Computer Misuse Act (1990) aim to prevent?
What does the Copyright, Design and Patents Act (1988) protect?
People’s work and ideas from being copied or shared without permission
What is proprietary software?
What is open source software?
Software that is free to use and edit, with source code available to all
Can you copy