Cyberspace, network security and data transfer

HideShow resource information
Name and describe three threats to cyber security.
Hacking: A hacker is a person who gains unauthorized access to a computer with bad intentions. Cyber stalking: Where individuals use technology to harass others. Data theft:The theft of customer records to obtain personal details.
1 of 5
Describe the difference between trojan horse and spyware.
A trojan horse gains entry to a computer in disguise and Spyware is malicious software which is secretly installed on a users computer.
2 of 5
Identify and explain three different levels of access.
Access rights can be classified as read only, read and copy and read and write. Each time a user attempts to access a data file the computer can check what level of access has been allocated.
3 of 5
Explain how data encryption is used when transferring files across a network.
Encryption uses special software to encode data before it is transmitted to make the data unreadable if intercepted.
4 of 5
Compare these internet protocols: http and https.
http is used to identify and transfer webpages. https is similar to http except it uses a secure socket layer.
5 of 5

Other cards in this set

Card 2

Front

Describe the difference between trojan horse and spyware.

Back

A trojan horse gains entry to a computer in disguise and Spyware is malicious software which is secretly installed on a users computer.

Card 3

Front

Identify and explain three different levels of access.

Back

Preview of the front of card 3

Card 4

Front

Explain how data encryption is used when transferring files across a network.

Back

Preview of the front of card 4

Card 5

Front

Compare these internet protocols: http and https.

Back

Preview of the front of card 5

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Acts, Security and Legislation resources »