Save
Digital Technology Unit 1
Cyberspace,network security and data transfer
Save
Share
Learn
Content
Leaderboard
Learn
Created by
Alice MacLeod
Visit profile
Cards (19)
Cyber
crime
Using a computer to intentionally commit a
crime
, e.g. stealing data or money
View source
Hacking
Gaining
unauthorised
access to a computer with the intention of corrupting or
stealing
data
View source
Malware
Malicious software that is unintentionally downloaded onto a computer by a user
View source
Malware
can enter the network through browsing the internet, opening email attachments, via a USB storage device, etc.
View source
Malware
can store itself automatically on a computer hard drive as a
hidden file
View source
Malware
can be activated when a certain program is
opened
or when a predetermined condition is met, e.g. a certain date
View source
Spamming
Sending junk
emails
to users, for example
adverts
for products
View source
Phishing
Sending emails that, when opened, appear to be from a reliable source asking the user to update their personal information. This information is then used by
hackers
for the purpose of
identity
theft.
View source
Data encryption
The process of
scrambling
data using a
key
before it is transmitted onto a network
View source
Data encryption
Makes the data
unreadable
or meaningless if
intercepted
Users with the
encryption key
software can unscramble the data when it
arrives
at its destination
View source
Usernames
and
passwords
Users on a network are allocated a unique user ID and a randomly generated password
Users are required to change
passwords
regularly by the network software to enhance security
Each time a user logs on, the system checks their user ID and password against a database of user details
Network software can disable the user ID for a period of time after unsuccessful log-on attempts
View source
Access
levels
Users are allocated different levels of
access
to files
Access rights can be classified as
read
only,
read
and copy or read and write
Access rights are stored in a
table
linked to the user ID and
password
View source
Backup
A
copy
of the data that can be loaded or restored on to the system if the original data is
lost
or corrupted
Network backups are usually
automatically
scheduled to run at certain times, e.g. the
end
of each day
View source
Firewall
A piece
of
software or hardware that
monitors
and controls data entering or leaving a network
Uses
security settings
to block data that does not comply with the
organisation's rules
View source
Protocols
Agreed
standards or rules for sending or receiving data on a network
Protocols are agreed by
hardware
manufacturers and
software
developers
View source
Protocols
used for data transfer
File transport protocol (
FTP
)
Hypertext transfer protocol (
HTTP
)
Hypertext transfer protocol secure (
HTTPS
)
View source
File
transport protocol (
FTP
)
Allows users to
download
or
upload
files over the internet
View source
Hypertext
transfer protocol (HTTP)
A protocol used by the
World Wide Web
to transfer webpages over the
internet
Sends a command on behalf of the user to the web server so
request
a
webpage
If a webpage cannot be located the
HTTP
will report an error, e.g.
406
File Not Found
View source
Hypertext
transfer protocol secure (HTTPS)
Uses a secure socket layer (
SSL
) to ensure data is transmitted securely over the internet
Uses
encryption
for sending data and
decryption
for receiving data
Web browsers display a
padlock
icon on screen to show that the web page currently in use is secure
The main use of this protocol is in
financial
applications, e.g. online PayPal transactions
View source