Security
10 flashcards to master Security
Smart Spaced Repetition
Rate each card Hard, Okay, or Easy after flipping. Your progress is saved and cards are scheduled for optimal review intervals.
Define the term 'malware' and give two examples.
'Malware' is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, Trojans, and ransomware.
Explain the difference between a virus and a worm.
A virus requires a host program to infect and spread, while a worm is a self-replicating program that can spread independently across a network without needing a host. Worms exploit vulnerabilities to self-propagate, often causing network congestion.
Describe what a Trojan horse is and how it deceives users.
A Trojan horse disguises itself as legitimate software to trick users into installing it. Once installed, it can perform malicious actions like stealing data, installing other malware, or granting unauthorized access to the system.
What is spyware and what are its potential consequences?
Spyware is software that secretly monitors and collects user information, such as browsing history, passwords, and financial details. It can lead to identity theft, financial loss, and compromised privacy.
Explain what ransomware is and how it affects a user's data.
Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. It can cripple businesses and individuals by holding their data hostage.
Describe the technique of 'phishing' and give an example.
Phishing involves deceiving users into revealing sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication. An example is an email pretending to be from a bank asking you to update your account details.
What is a firewall and how does it enhance computer security?
A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It helps protect a network from unauthorized access, malware, and other cyber threats.
Explain the purpose of authentication and describe two methods used to authenticate users.
Authentication verifies the identity of a user or device attempting to access a system or network. Two common methods are password authentication (using a secret word or phrase) and biometric authentication (using unique biological traits like fingerprints).
What is two-factor authentication (2FA) and why is it more secure than single-factor authentication?
Two-factor authentication requires users to provide two different types of authentication factors (
Describe the purpose and importance of creating regular data backups.
Data backups involve creating copies of important data to be stored separately from the original source. This provides a safety net in case of data loss due to hardware failure, malware attacks, human error, or natural disasters, allowing for data restoration and minimizing downtime.
Key Questions: Security
Define the term 'malware' and give two examples.
'Malware' is any software intentionally designed to cause damage to a computer, server, client, or computer network. Examples include viruses, worms, Trojans, and ransomware.
Describe what a Trojan horse is and how it deceives users.
A Trojan horse disguises itself as legitimate software to trick users into installing it. Once installed, it can perform malicious actions like stealing data, installing other malware, or granting unauthorized access to the system.
What is spyware and what are its potential consequences?
Spyware is software that secretly monitors and collects user information, such as browsing history, passwords, and financial details. It can lead to identity theft, financial loss, and compromised privacy.
Explain what ransomware is and how it affects a user's data.
Ransomware is a type of malware that encrypts a victim's files, making them inaccessible until a ransom is paid to the attacker. It can cripple businesses and individuals by holding their data hostage.
Describe the technique of 'phishing' and give an example.
Phishing involves deceiving users into revealing sensitive information, such as usernames, passwords, and credit card details, by disguising as a trustworthy entity in an electronic communication. An example is an email pretending to be from a bank asking you to update your account details.
About Security (5.3)
These 10 flashcards cover everything you need to know about Security for your Cambridge IGCSE Computer Science (0478) exam. Each card is designed based on the official syllabus requirements.
What You'll Learn
- 8 Definitions - Key terms and their precise meanings that examiners expect
- 2 Key Concepts - Core ideas and principles from the 0478 syllabus
How to Study Effectively
Use the Study Mode button above to test yourself one card at a time. Try to answer each question before flipping the card. Review cards you find difficult more frequently.
Continue Learning
After mastering Security, explore these related topics:
- 5.2 The Internet - 10 flashcards
- 6.1 Automated systems - 9 flashcards
Study Mode
Space to flip • ←→ to navigate • Esc to close
You're on a roll!
You've viewed 10 topics today
Create a free account to unlock unlimited access to all revision notes, flashcards, and study materials.
You're all set!
Enjoy unlimited access to all study materials.
Something went wrong. Please try again.
What you'll get:
- Unlimited revision notes & flashcards
- Track your study progress
- No spam, just study updates