Cyberspace,network security and data transfer

Cards (19)

  • Cyber crime

    Using a computer to intentionally commit a crime, e.g. stealing data or money
  • Hacking
    Gaining unauthorised access to a computer with the intention of corrupting or stealing data
  • Malware
    Malicious software that is unintentionally downloaded onto a computer by a user
  • Malware can enter the network through browsing the internet, opening email attachments, via a USB storage device, etc.
  • Malware can store itself automatically on a computer hard drive as a hidden file
  • Malware can be activated when a certain program is opened or when a predetermined condition is met, e.g. a certain date
  • Spamming
    Sending junk emails to users, for example adverts for products
  • Phishing
    Sending emails that, when opened, appear to be from a reliable source asking the user to update their personal information. This information is then used by hackers for the purpose of identity theft.
  • Data encryption
    The process of scrambling data using a key before it is transmitted onto a network
  • Data encryption
    • Makes the data unreadable or meaningless if intercepted
    • Users with the encryption key software can unscramble the data when it arrives at its destination
  • Usernames and passwords
    • Users on a network are allocated a unique user ID and a randomly generated password
    • Users are required to change passwords regularly by the network software to enhance security
    • Each time a user logs on, the system checks their user ID and password against a database of user details
    • Network software can disable the user ID for a period of time after unsuccessful log-on attempts
  • Access levels

    • Users are allocated different levels of access to files
    • Access rights can be classified as read only, read and copy or read and write
    • Access rights are stored in a table linked to the user ID and password
  • Backup
    • A copy of the data that can be loaded or restored on to the system if the original data is lost or corrupted
    • Network backups are usually automatically scheduled to run at certain times, e.g. the end of each day
  • Firewall
    • A piece of software or hardware that monitors and controls data entering or leaving a network
    • Uses security settings to block data that does not comply with the organisation's rules
  • Protocols
    • Agreed standards or rules for sending or receiving data on a network
    • Protocols are agreed by hardware manufacturers and software developers
  • Protocols used for data transfer

    • File transport protocol (FTP)
    • Hypertext transfer protocol (HTTP)
    • Hypertext transfer protocol secure (HTTPS)
  • File transport protocol (FTP)

    Allows users to download or upload files over the internet
  • Hypertext transfer protocol (HTTP)

    • A protocol used by the World Wide Web to transfer webpages over the internet
    • Sends a command on behalf of the user to the web server so request a webpage
    • If a webpage cannot be located the HTTP will report an error, e.g. 406 File Not Found
  • Hypertext transfer protocol secure (HTTPS)

    • Uses a secure socket layer (SSL) to ensure data is transmitted securely over the internet
    • Uses encryption for sending data and decryption for receiving data
    • Web browsers display a padlock icon on screen to show that the web page currently in use is secure
    • The main use of this protocol is in financial applications, e.g. online PayPal transactions