what is ethics? | a set of laws that regulate the use of computer |
what does computer ethics cover? | 1. intellectual property rights
2. privacy issue
3. impact of computer on society |
What is freeware | -can be downloaded for free on Internet
-it has copyright laws (isn't allow to study or modify the source code)
-can copy/share
- a type of software license
-distributed without source code |
what is freeware? | -user can copy, run, change, adapt free software
-user given freedom to study and modify source code
- a type of software license
-user can't add source code from software which isn't a free software |
what is shareware | -user are allowed to try this software for free for a period of time
-after, they need pay to continue
-protected copyright law
-user can't use source code in their own source
-a type of software lincese |
what are biometric? | type of authentication which uses physical quantities of humans |
how does fingerprints password work? | image of finger compared to stored, looking for ridges and valleys |
how does retina scanner work? | -uses infra-red to scan unique pattern of blood vessel at back of eyes
-compared to stored image |
what is encryption? | used to protect data in case it gets hacked, though it does not stop hacking, it makes hacking meaningless |
what does firewall do? (4) | 1. examines traffic between user's computer and Internet, whether incoming or outgoing data meets criteria. If not, firewall blocks traffic and warns user
2. can be hardware or software
3. keeps a list of undesirable IP address
4. saves all traffic so user can inspect later |
state 3 disadvantages of firewalls | 1. cannot prevent people using own modems to bypass firewall
2. cant control carelessness
3. user can disable firewall |
what is a proxy server? (4) | 1. acts as an intermediary between user's computer and web server
2. allow traffic to be filtered, blocking access of certain websites
3. keep user IP a secret
4. use cache to speed up access of info |
what does SSL stand for? | secure socket layer |
what does SSL do? | type of protocol which allows data to be sent and received securely over internet by encrypting data |
describe process of SSL (5 steps) | 1. wb attempts to connect to website secured by SSL, asks was to identify itself
2. ws sends wb copy of security certificate
3. ws checks if valid, sends message back to ws
4. ws sends form of acknowledgement allowing encryption session to begin
5. encrypted data shared securely between wb and ws |
what are the 2 types of TLS layers? | record protocol and handshake protocol |
what is record protocol? | holds data being transferred over the internet (use with or without encryption) |
what is handshake protocol? | permits website and user to authenticate each other using encryption algorithm |
what does TLS stand for? | Transport Layer Security |
what does TLS do? | - type of protcol that ensures security and privacy of data tranmission over the internet
- provide encryption, authentication and data intergrity better than SSL
-prevent third-party hacking |
How is SSL better than TLS? (3) | 1. possible to add new authetication methods in SSL
2. TLS separates process of record and handshaking
3. TLS uses process called caching |
what is symmetric encryption? | -uses key and encryption algorithm
-uses one key (same key) to encrypt and decrypt data
-caesar cipher |
plain text + key + algorithm =? | cipher text |
what is asymmetric encryption? | - uses one public and one private key
- more secure than symmetric
- SSL |
what is phishing? | attacker sends email with link. Victim clicks, directed to fake website |
what are 2 effect of risk of phishing? | 1. gain personal info
2. identity theft |
2 methods to avoid phishing | 1. dont open emails from unknown source
2. ISP (internet service provider) filters phishing emails |
what is pharming? | attacker installs malicious code on victim hard drive or ws. Code redirect them to fake website |
What are 2 effects of pharming | 1. gain personal info
2. identity theft |
2 methods to avoid pharming | 1. anti-spyware can identify and remove pharming code
2. be alert (look for https) |
what does Dos stand for? | denial of service |
what is Dos attack? | prevents user from accessing part of a network. Temporary. Flooding network with useless traffic |
how does DoS work? | 1. when user clicks or enter link, a request is send to ISP which contains website
2. a server can only handle some request. If flooded, it wont be able to handle legitimate request, denying it |
how to avoid DoS attack? | 1. use firewalls
2. email filters
3. look out for slow performance
4. lookout for spam emails
5. malware/ virus checker |