0% found this document useful (0 votes)
38 views2 pages

Systems Software Homework 1 Threats To Online Data

Uploaded by

CT O
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views2 pages

Systems Software Homework 1 Threats To Online Data

Uploaded by

CT O
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Homework 1 Network threats

Unit 3 Systems software and security

Homework 1 Network threats


1. The following five statements about Internet security are incomplete:

(i) __________________________________ is software that is written with malicious


intent, typically with the aim of corrupting files of gaining unauthorised access to a
user’s files

(ii) _________________________________ include a link which when clicked on may


download a virus or lead you to a bogus website selling fake or non-existent products

(iii) _________________________________ appear to be legitimate emails which ask


the user to click on a link; the link sends them to a fake website where they may be
asked to enter personal details such as bank account information

(iv) _________________________________ is software that covertly gathers information


from your computer and sends it back to the author who can sell or use the data for
advertising or identity theft

(v) _________________________________ is a scamming practice in which malicious


code is installed on a user’s computer, misdirecting users to fraudulent websites
without their knowledge or consent

Complete the five statements using words from the following list:
spam
Trojan horse email
spyware
phishing emails
pharming
virus-generated emails
cookies
adware
malware [5]

2. Study the email on the following page. Describe three clues which indicate that it is a
phishing scam. [3]

1
Homework 1 Network threats
Unit 3 Systems software and security

3. (a) Describe what is meant by a denial of service attack. [2]

(b) Indicate in the right-hand column whether each of the following statements about a
denial of service attack is true or false. [5]
True or
False
It aims to block an individual’s email account

The aim of the attack is spread misinformation about an organisation

The motive is often blackmail or revenge

It may cause the victim’s network site to crash

It may be unintentional

[Total 15 marks]

You might also like