SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: security

Questions and Answers List

level questions: security

QuestionAnswer
what is ethics?a set of laws that regulate the use of computer
what does computer ethics cover?1. intellectual property rights 2. privacy issue 3. impact of computer on society
What is freeware-can be downloaded for free on Internet -it has copyright laws (isn't allow to study or modify the source code) -can copy/share - a type of software license -distributed without source code
what is freeware?-user can copy, run, change, adapt free software -user given freedom to study and modify source code - a type of software license -user can't add source code from software which isn't a free software
what is shareware-user are allowed to try this software for free for a period of time -after, they need pay to continue -protected copyright law -user can't use source code in their own source -a type of software lincese
what are biometric?type of authentication which uses physical quantities of humans
how does fingerprints password work?image of finger compared to stored, looking for ridges and valleys
how does retina scanner work?-uses infra-red to scan unique pattern of blood vessel at back of eyes -compared to stored image
what is encryption?used to protect data in case it gets hacked, though it does not stop hacking, it makes hacking meaningless
what does firewall do? (4)1. examines traffic between user's computer and Internet, whether incoming or outgoing data meets criteria. If not, firewall blocks traffic and warns user 2. can be hardware or software 3. keeps a list of undesirable IP address 4. saves all traffic so user can inspect later
state 3 disadvantages of firewalls1. cannot prevent people using own modems to bypass firewall 2. cant control carelessness 3. user can disable firewall
what is a proxy server? (4)1. acts as an intermediary between user's computer and web server 2. allow traffic to be filtered, blocking access of certain websites 3. keep user IP a secret 4. use cache to speed up access of info
what does SSL stand for?secure socket layer
what does SSL do?type of protocol which allows data to be sent and received securely over internet by encrypting data
describe process of SSL (5 steps)1. wb attempts to connect to website secured by SSL, asks was to identify itself 2. ws sends wb copy of security certificate 3. ws checks if valid, sends message back to ws 4. ws sends form of acknowledgement allowing encryption session to begin 5. encrypted data shared securely between wb and ws
what are the 2 types of TLS layers?record protocol and handshake protocol
what is record protocol?holds data being transferred over the internet (use with or without encryption)
what is handshake protocol?permits website and user to authenticate each other using encryption algorithm
what does TLS stand for?Transport Layer Security
what does TLS do?- type of protcol that ensures security and privacy of data tranmission over the internet - provide encryption, authentication and data intergrity better than SSL -prevent third-party hacking
How is SSL better than TLS? (3)1. possible to add new authetication methods in SSL 2. TLS separates process of record and handshaking 3. TLS uses process called caching
what is symmetric encryption?-uses key and encryption algorithm -uses one key (same key) to encrypt and decrypt data -caesar cipher
plain text + key + algorithm =?cipher text
what is asymmetric encryption?- uses one public and one private key - more secure than symmetric - SSL
what is phishing?attacker sends email with link. Victim clicks, directed to fake website
what are 2 effect of risk of phishing?1. gain personal info 2. identity theft
2 methods to avoid phishing1. dont open emails from unknown source 2. ISP (internet service provider) filters phishing emails
what is pharming?attacker installs malicious code on victim hard drive or ws. Code redirect them to fake website
What are 2 effects of pharming1. gain personal info 2. identity theft
2 methods to avoid pharming1. anti-spyware can identify and remove pharming code 2. be alert (look for https)
what does Dos stand for?denial of service
what is Dos attack?prevents user from accessing part of a network. Temporary. Flooding network with useless traffic
how does DoS work?1. when user clicks or enter link, a request is send to ISP which contains website 2. a server can only handle some request. If flooded, it wont be able to handle legitimate request, denying it
how to avoid DoS attack?1. use firewalls 2. email filters 3. look out for slow performance 4. lookout for spam emails 5. malware/ virus checker