Cambridge IGCSE Computing 0.0 / 5 ? ComputingChapter 8 - Security and EthicsIGCSECIE Created by: MFtoeCreated on: 11-05-18 12:17 Breaking into a computer system to steal personal data Hacking 1 of 23 Editing a program source code for a malicious purpose Cracking 2 of 23 Legitimate looking emails sent to users asking for personal/ financial details Phishing 3 of 23 Program code that replicates and corrupts data causing malfunction and the computer to run slowly Virus 4 of 23 Malicious code installed on a computer/web server which redirects user to fake websites without their knowledge asking for personal/ financial data Pharming 5 of 23 Locating and using wifi illegally and stealing internet time and bandwidth, passwords and other data may be intercepted Wardriving 6 of 23 Gathers data by monitoring keys pressed on the user's keyboard Spyware 7 of 23 Pieces of data which allow detection of web pages viewed by a user and store their preferences Cookies 8 of 23 Accidentally deleting a file Accidental mal-operation 9 of 23 Malicious attack from viruses/ hacking Malicious mal-operation 10 of 23 Hardware faults Head crash 11 of 23 Pieces of incompatible software Software faults 12 of 23 SSL Secure Socket Layer 13 of 23 TLS Transport Layer Security 14 of 23 Acts as an intermediary between user and web server Proxy server 15 of 23 Examines traffic between user's computer and public network Firewall 16 of 23 Verifying data comes from a trusted source Authentication 17 of 23 Uses a secret key only Symmetric Encryption 18 of 23 Use public and private keys Asymmetric Encryption 19 of 23 DoS Denial of service attack 20 of 23 Freedom to run, copy, change or adopt Free Software 21 of 23 Download free of charge and subject to copyright Freeware 22 of 23 Users allowed to use for a trial period and then requested to pay when it is over Shareware 23 of 23
Comments
No comments have yet been made