Name and describe three threats to cyber security.
Hacking: A hacker is a person who gains unauthorized access to a computer with bad intentions. Cyber stalking: Where individuals use technology to harass others. Data theft:The theft of customer records to obtain personal details.
1 of 5
Describe the difference between trojan horse and spyware.
A trojan horse gains entry to a computer in disguise and Spyware is malicious software which is secretly installed on a users computer.
2 of 5
Identify and explain three different levels of access.
Access rights can be classified as read only, read and copy and read and write. Each time a user attempts to access a data file the computer can check what level of access has been allocated.
3 of 5
Explain how data encryption is used when transferring files across a network.
Encryption uses special software to encode data before it is transmitted to make the data unreadable if intercepted.
4 of 5
Compare these internet protocols: http and https.
http is used to identify and transfer webpages. https is similar to http except it uses a secure socket layer.
5 of 5
Other cards in this set
Card 2
Front
Describe the difference between trojan horse and spyware.
Back
A trojan horse gains entry to a computer in disguise and Spyware is malicious software which is secretly installed on a users computer.
Card 3
Front
Identify and explain three different levels of access.
Back
Card 4
Front
Explain how data encryption is used when transferring files across a network.
Comments
No comments have yet been made