Subdecks (1)

Cards (30)

  • Access levels use levels of access, each protected by a username and password to ensure that only authorised users can access the key data
  • Anti-spyware software detects and removes spyware using two methods.
    • Rules: looks for certain features associated with spyware
    • File structures: looks for file structures common in spyware
  • Spyware also prevents the downloading of spyware, encrypts files and keyboard strokes, blocks access to webcams and microphones if necessary and scans for signs that personal data has been stolen to warn the user
  • Authentication refers to the ability of users to prove who they are. Three factors are used: something a user knows, something a user, has and something unique to the user
  • Passwords are the most common form of authentication. They should be changed regularly, difficult to guess and contain special characters. Passwords are often entered twice to verify them
  • Two step verification uses two different kinds of authentication are used to verify the user's identity. For example, when pins are sent to a users email to allow them to log in to a website
  • Automatic software updates keep data secure by ensuring that the most up to date anti-malware software is running. Often carried out overnight
  • Users should check spelling and tone of communication and URLs. Typo squatting (e.g Goggle or Amoozon) is used to make the website seem genuine. Grammar should also be checked.
  • Firewalls can be either software or hardware and they sit between the user’s computer and an external network. Primary defence to any computer system from any cybercriminal activity.
  • Firewalls:
    • Examine all “traffic” between the computer and external network
    • If traffic doesn’t meet criteria, it is blocked and a warning is sent to the user
    • Keeps lists of undesirable IPs and prevents access to these websites
    • Can prevent viruses and hackers
    • Maintain a log so that users can check daily activity
  • Firewalls cannot prevent harmful traffic if individuals bypass the network’s firewall, in cases of employee misconduct or carelessness or if the firewall is disabled
  • Proxy Servers are an intermediate between a user and a web server which filters Internet traffic, keeps user’s IP secret, and prevents direct access to a web server by being between the user and the server
  • Proxy servers can block requests from certain IP addresses, act as a firewall and direct away invalid traffic
  • If a cyberattack is launched, the proxy server is affected instead of the web server, securing the web server
  • Proxy servers use a “cache” to store web pages that have already been visited and then deliver it to the client quicker
  • Privacy settings are controls available on web browsers and websites that are designed to limit who can access and see a user’s personal data
  • Privacy settings can include preventing location sharing, preventing websites collecting browsing data and advertising opt-outs
  • Secure Socket Layer is a type of protocol used for secure communication across networks. When a user logs into a website, SSL encrypts the data, which is seen as a green padlock or https in the address window
  • SSL certificates are a form of digital certification used to authenticate a website. SSL is used during online banking, online shopping, using cloud storage or using VoIP
  • The users browser sends a message to connect with the SSL secured website, the browser then requests that the web server identifies itself. The web server sends a copy of its SSL certificate to the user’s browser. If this is authenticated, the browser sends a message to the server and the two acknowledge each other, and data transfer begins.