4.2 Network issues and communication

Cards (51)

  • Cloud computing
    Replacing some of the most expensive personal computing hardware
  • Cloud computing is replacing expensive software upgrades
  • An advantage of cloud computing is that an internet connection is not necessary
  • If you have an email account with Gmail, your emails are stored in the cloud
  • Security of computer networks
    • All networks must be kept secure so that data is not corrupted or stolen
    • All online systems can be hacked and data can be stolen when it is stored or transmitted
    • Networks should be protected against data interception and theft
    • Data traffic in LANs and WANs can be intercepted
  • Hacking
    Gaining unauthorised access to data in a system or computer
  • Hacking has lead to millions of cases of personal data, including passwords and financial details, being stolen in recent years
  • Some of the data was left on unprotected servers making it very easy for hackers
  • Criminals can also use spyware, which monitors user key presses and can help them to discover passwords and pins etc.
  • Encryption
    The process of turning information (e.g. a message) into a form that only the intended recipient can decrypt and read
  • Decryption
    The process of recovering the original text from the encrypted text
  • Asymmetric encryption
    A method of encryption that uses two different keys - a 'public' key and a 'private' key
  • Key
    A piece of information that is used for encrypting and decrypting data
  • Firewall
    Software or hardware devices that protect against unauthorised access to a network
  • Authentication
    The process or action of proving or showing something to be true, genuine or valid
  • Password
    A secret word or phrase that must be used to gain admission to a place
  • Strong password
    • At least eight characters long
    • Contains both numbers and letters
    • Contains both upper and lower case letters
    • Contains at least one special character
    • Never uses user-identifiable items
  • Weak passwords are ones that can be easily guessed or discovered by hackers
  • It is important that all systems are checked for malware, such as spyware, so that criminals cannot intercept the passwords or monitor computers to find out what the user is entering
  • On average people each have 26 different online logins, so password management is a very important part of staying safe online
  • Even though we might have 26 different accounts, on average we only use five different passwords
  • Biometric methods

    Technologies that analyse unique personal characteristics such as fingerprints, eye retinas and irises, voice and facial patterns, and hand measurements as a form of identification
  • Biometric data
    Records that are used to identify people by a physical attribute that doesn't change
  • Biometric authentication
    • Verification - to make sure a person is who they say they are
    • Identification - to identify a person in a crowd
    • Screening - to match a person who may be on a 'watch list' for security purposes
  • Magnetic stripe
    Personal and security data can be encoded on the magnetic stripe of a card and can be swiped through a reader to allow access
  • Smart card
    A plastic card with a built-in processor
  • Physical token
    A personal device that authenticates a person's identity
  • Electronic tokens
    Also called cryptocurrencies. They function as a medium of exchange between people and businesses
  • Zero login
    Technologies are being developed so that users can be authenticated, not by a password or physical features, but by how they behave
  • Malware is short for malicious software and is designed to get into computers without the user's consent and to disrupt or damage the computer
  • Zero login
    A method of authentication not requiring a user to login. They are authenticated by their behaviour and the way they do things
  • Malware
    Software designed to gain unauthorised access to a computer system in order to disrupt its functioning or collect information without the user's knowledge
  • Anti-malware software

    Software used to prevent, detect and neutralise malware
  • Quarantine
    The placing of suspected malware into a specific area of a storage device
  • Steps to prevent malware infection
    1. Install anti-malware software and ensure it is continually updated
    2. Scan all storage media to detect and destroy or quarantine malware
    3. Install a firewall to ensure software is not downloaded without your knowledge
    4. Ensure the operating system is up to date
    5. Install the latest security updates
    6. Install anti-spyware protection software
    7. Avoid opening emails and attachments from unknown sources
    8. Scan all data files as they are downloaded
    9. Only download programs from trusted websites
    10. Read all security warnings, licence agreements and privacy statements
    11. Never click 'Agree' or 'OK' to close a window, instead click the red 'X'
    12. Be wary of popular 'free' music and movie file-sharing programs
  • Electronic-conferencing
    A meeting between individuals who are not in the same room or location using communications technology
  • Audio-conferencing
    People in different locations use technology to speak to each other
  • Video-conferencing
    A meeting where people at different locations can see and talk to each other while sitting in front of a camera and a microphone
  • Web-conferencing
    A live meeting held via the internet usually on a computer or smartphone
  • Webcast
    A one-way transmission which is non-interactive