Computing(1.4,1.6,2.4)

?
  • Created by: Markio
  • Created on: 08-05-21 15:48
What is social engineering
Technique used by criminals to reveal sensitive I formation by pretending to be a bank or a site you use
1 of 32
What is phishing
Type of social engineering but it's often by an email link or pretending there is a problem
2 of 32
What is a brute force attack
Software that tries to guess every password to get into your data
3 of 32
What is a DoS attack
Spam commands into a server so it over loads and crashes
4 of 32
What is an SQL injection
Enters malicious code into web form so it can bypass authentication process and access data
5 of 32
What are the different types of malware and what do they do
Viruses,worms,Trojans,spyware,keyloggers,ransoware
6 of 32
What do viruses do and how are they spread
Corrupt and modify data and spread by websites and removable media
7 of 32
What do worms do and how are they spread
Replicate and are very effective spread by emails and peer to peer
8 of 32
What do Trojans do
Hode in legitimate software and created changes in security for hackers to get in and get data
9 of 32
What does spyware do and how is it spread
Gathers data about your activity and gives it to 3rd party. Can also redirect you to sites with other malware and is spread from pop up ads
10 of 32
What do keyloggers do
Record every key you press and every mouse click and spread to third party
11 of 32
What does Ransome ware do
Encrypted or locks data and demands a payment for access
12 of 32
How do you prevent malware
Firewall,antispy,spam filter
13 of 32
How do you prevent phishing
Diable browsers pop ups
14 of 32
Prevent DOS
Firewall, packet filtering
15 of 32
How do prevent data interception
Encryption
16 of 32
How do you prevent SQL injections
Input validation and penetration testing
17 of 32
What is penetration testing
Getting people to hack into your site
18 of 32
What are fire walls
Scans packets for malicious code
19 of 32
How do you prevent brute force attacks
Captchas and progressive delays
20 of 32
What is an ethical problem with computing
Increase in cyber bullying
21 of 32
What is an environmental issue with computing
E-waste
22 of 32
What is a cultural issue with computing
Different pace of tech and the digital device between people who can afford it and who cant
23 of 32
What is a legal issue with computing
Data protection act 1998,computer misuse 1990,copyright design and patent act 1988 and the freedom of imagination act 2000
24 of 32
What does data protection act do
All data must be secure and accurate and has to be relevant
25 of 32
What does the computer misuse act do
Illegal to make unauthorised access to data
26 of 32
What does the copywriter act do
Illegal to copy, modify or publish media without permission
27 of 32
What does the freedom of information act do
people can request information from public bodies
28 of 32
What is a creative commons license
Allows the author to retain copyright but individuals can copy and distribute their work
29 of 32
What are the privacy issues with computing
Data being held for 6 months,face recognition and smart devices listening and recording things you say
30 of 32
What is open source software
Users can modify and distribute software and have access to source code but its more always tested
31 of 32
What is proprietary software
Users can modify work under the copyright act but dknt have access to source code and its tested before being released
32 of 32

Other cards in this set

Card 2

Front

What is phishing

Back

Type of social engineering but it's often by an email link or pretending there is a problem

Card 3

Front

What is a brute force attack

Back

Preview of the front of card 3

Card 4

Front

What is a DoS attack

Back

Preview of the front of card 4

Card 5

Front

What is an SQL injection

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Networks resources »