Computing(1.4,1.6,2.4) 0.0 / 5 ? ComputingNetworksGCSEOCR Created by: MarkioCreated on: 08-05-21 15:48 What is social engineering Technique used by criminals to reveal sensitive I formation by pretending to be a bank or a site you use 1 of 32 What is phishing Type of social engineering but it's often by an email link or pretending there is a problem 2 of 32 What is a brute force attack Software that tries to guess every password to get into your data 3 of 32 What is a DoS attack Spam commands into a server so it over loads and crashes 4 of 32 What is an SQL injection Enters malicious code into web form so it can bypass authentication process and access data 5 of 32 What are the different types of malware and what do they do Viruses,worms,Trojans,spyware,keyloggers,ransoware 6 of 32 What do viruses do and how are they spread Corrupt and modify data and spread by websites and removable media 7 of 32 What do worms do and how are they spread Replicate and are very effective spread by emails and peer to peer 8 of 32 What do Trojans do Hode in legitimate software and created changes in security for hackers to get in and get data 9 of 32 What does spyware do and how is it spread Gathers data about your activity and gives it to 3rd party. Can also redirect you to sites with other malware and is spread from pop up ads 10 of 32 What do keyloggers do Record every key you press and every mouse click and spread to third party 11 of 32 What does Ransome ware do Encrypted or locks data and demands a payment for access 12 of 32 How do you prevent malware Firewall,antispy,spam filter 13 of 32 How do you prevent phishing Diable browsers pop ups 14 of 32 Prevent DOS Firewall, packet filtering 15 of 32 How do prevent data interception Encryption 16 of 32 How do you prevent SQL injections Input validation and penetration testing 17 of 32 What is penetration testing Getting people to hack into your site 18 of 32 What are fire walls Scans packets for malicious code 19 of 32 How do you prevent brute force attacks Captchas and progressive delays 20 of 32 What is an ethical problem with computing Increase in cyber bullying 21 of 32 What is an environmental issue with computing E-waste 22 of 32 What is a cultural issue with computing Different pace of tech and the digital device between people who can afford it and who cant 23 of 32 What is a legal issue with computing Data protection act 1998,computer misuse 1990,copyright design and patent act 1988 and the freedom of imagination act 2000 24 of 32 What does data protection act do All data must be secure and accurate and has to be relevant 25 of 32 What does the computer misuse act do Illegal to make unauthorised access to data 26 of 32 What does the copywriter act do Illegal to copy, modify or publish media without permission 27 of 32 What does the freedom of information act do people can request information from public bodies 28 of 32 What is a creative commons license Allows the author to retain copyright but individuals can copy and distribute their work 29 of 32 What are the privacy issues with computing Data being held for 6 months,face recognition and smart devices listening and recording things you say 30 of 32 What is open source software Users can modify and distribute software and have access to source code but its more always tested 31 of 32 What is proprietary software Users can modify work under the copyright act but dknt have access to source code and its tested before being released 32 of 32
Comments
No comments have yet been made