System Security, System Software - Operating Systems, System Software - Utilities, Issues and Legislation

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

What is malware?

Any software which can harm a computer or user

2
New cards

What are viruses?

Small programs which aim to cause physical harm to a computer system

3
New cards

What does a standard virus do?

Hides in files or programs, replicates, and deletes data

4
New cards

What does a worm virus do?

Replicates itself and slows the computer

5
New cards

What does a trojan virus do?

Disguises as a useful program but causes harm in the background

6
New cards

What is the aim of spyware?

To spy on the user and collect their information

7
New cards

What does a key logger do?

Tracks every key a user hits to try identify their password

8
New cards

What might happen to information collected by spyware?

It may be sold to third parties for targeted advertising

9
New cards

What does adware do?

Downloads and displays unwanted adverts and collects marketing information

10
New cards

What does pharming malware do?

Changes DNS IP addresses to redirect users to fake websites

11
New cards

What is scareware?

Pop-ups that trick users into buying fake virus protection software

12
New cards

What does ransomware do?

Locks a computer and demands payment to unlock it

13
New cards

What is phishing?

Tricking users into giving away sensitive information by pretending to be a legitimate company

14
New cards

What is social engineering?

Manipulating people to make security-compromising mistakes

15
New cards

What is a brute force attack?

Trying thousands of password combinations to hack an account

16
New cards

What is the aim of a denial of service attack?

To crash a web server by overwhelming it with login attempts

17
New cards

What may criminals demand after a DoS attack?

Money in return for stopping the attack

18
New cards

What can hackers use to monitor and intercept network traffic?

Specialist hardware and packet sniffers

19
New cards

Why is encryption important?

Because it protects sensitive data from being intercepted and read

20
New cards

What is an SQL injection?

Adding or creating bits of code that act like variables to alter SQL statements

21
New cards

How can an SQL injection be used maliciously?

By bolting SQL onto a password to access other users’ accounts

22
New cards

What is penetration testing?

Simulating attacks to find weaknesses and improve system security

23
New cards

Why should networks monitor traffic?

To detect attacks and help identify how and by whom they were carried out

24
New cards

What is an Acceptable Use Policy?

A list of rules for network users to follow to maintain security

25
New cards

What might an AUP include?

Use complex passwords, restrict access, lock devices, and avoid unapproved downloads

26
New cards

What is a Backup Policy?

A plan for how, when, and where data should be backed up

27
New cards

What might a Backup Policy include?

Who backs up, backup frequency, and backup storage location

28
New cards

What is a Disaster Recovery Policy?

A plan for restoring systems after a failure or attack

29
New cards

What might a Disaster Recovery Policy include?

Responsible person, storage media, and recovery support organisations

30
New cards

What does anti-virus software do?

Finds and destroys viruses

31
New cards

Why must anti-virus software be up-to-date?

To remain effective against the latest threats

32
New cards

What does a firewall do?

Monitors data through ports and keeps them closed unless expected

33
New cards

What are user access levels?

Different access rights for users based on their role

34
New cards

Why are user access levels important?

To prevent unauthorised access to sensitive information

35
New cards

Why are passwords used on networks?

To block unauthorised access

36
New cards

What is a physical security measure for network rooms?

Locks with passcodes or biometrics

37
New cards

What are cameras and motion sensors used for in network security?

To monitor and prevent unauthorised access

38
New cards

What is system software?

Software that allows a computer to run and be maintained

39
New cards

What is the most important piece of software on a computer?

The operating system

40
New cards

What does the operating system control and communicate with?

The computer hardware

41
New cards

What else can the operating system communicate with?

The application that is running

42
New cards

What is the operating system often compared to?

A bridge between the hardware and the application

43
New cards

What is the kernel?

The core of the OS responsible for low-level hardware operations

44
New cards

What does each device register with the kernel?

Its driver file

45
New cards

What does a driver file contain?

Code allowing the OS to communicate with the device

46
New cards

What are the five main roles of an operating system?

Memory management, peripheral management, multi-tasking, security, user interface

47
New cards

How does the OS manage memory?

It loads applications into RAM and ensures each has enough space

48
New cards

What is virtual memory?

Memory the OS manages when RAM runs out

49
New cards

How does the OS manage peripherals?

By controlling access to devices attached to the computer

50
New cards

What is an interface?

A way for users to interact with a computer

51
New cards

What does a GUI use to control a computer?

Windows, icons, menus, and pointers

52
New cards

How does a menu-driven interface work?

By using menus to control the computer

53
New cards

How is a command line interface used?

Through written commands

54
New cards

Why is a command line interface efficient?

Because advanced users can operate it quickly

55
New cards

How does an OS enable multi-tasking?

By managing CPU processes so several programs can run

56
New cards

How can the OS manage multitasking processes?

By taking turns or finishing the shortest job first

57
New cards

How does the OS manage user data?

By ensuring each user’s data is private to themIn this way an OS provides security to users

58
New cards

What are utility programs?

Programs included in modern operating systems to perform useful functions

59
New cards

What are the three main purposes of utility programs?

Keep the system secure, organize storage, maintain the system

60
New cards

What does encryption software do?

Facilitates the encryption of data

61
New cards

What does formatting do to a storage device?

Prepares it for data storage by creating sectors, tracks, and a File Allocation Table (FAT)

62
New cards

What is the FAT used for?

To track where data is located on a storage device

63
New cards

What happens when you delete a file?

The computer marks the space as empty, but the data is still there

64
New cards

What size are the sectors on a hard disk?

512 bytes

65
New cards

How is data stored on a hard disk?

In 512-byte blocks that can become fragmented over time

66
New cards

What is fragmentation?

When data blocks are scattered across a hard drive, making reading slower

67
New cards

What does defragmentation software do?

Reorganizes fragmented files so related blocks are stored next to each other

68
New cards

What does compression software do?

Reduces the size of a file

69
New cards

What is backup software used for?

To create copies of data and store them elsewhere

70
New cards

What is a full backup?

A complete copy of all files on a system; slow but easy to restore

71
New cards

What is an incremental backup?

Only backs up files that have changed since the last backup; faster but harder to restore completely

72
New cards

What is a stakeholder?

A person or group affected by an issue
What does the Data Protection Act (2018) require companies to do?

73
New cards

What rights does the data subject have under the Data Protection Act?

To access, update, and delete data held about them
What does the Computer Misuse Act (1990) aim to prevent?

74
New cards

What does the Copyright, Design and Patents Act (1988) protect?

People’s work and ideas from being copied or shared without permission
What is proprietary software?

75
New cards

What is open source software?

Software that is free to use and edit, with source code available to all
Can you copy

76
New cards