Categories
Theory

Pixelation

Pixelation as a concept is best demonstrated by two versions of the same image, one with a much lower resolution than the other. The image below is the original image, the image to the right is the pixelated image. Both images are exactly 500 x 500 pixels in size (remember a pixel is a block […]

Categories
Theory

Pharming

Pharming is defined as the fraudulent practice of directing Internet users to a bogus (fake) website that mimics (copies) the appearance of a legitimate (official) one, in order to obtain personal information such as passwords, account numbers, etc. Do not confuse pharming with phishing.

Categories
Theory

Phishing

Phishing is the fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising a message as an official, trustworthy electronic communication. Typically carried out by e-mail spoofing – as well as via SMS (“smishing”), instant messaging, and text messaging – a phishing message includes a hyperlink (or […]

Categories
Theory

Catfishing

Catfishing is defined as “luring (someone) into a relationship by means of a fictional online persona”. The goal of building this relationship could be any one of the following: To bully or harass or physically harm the victim (see: cyberbullying, grooming) To gain personal information about the victim to commit fraud with their information The […]

Categories
Theory

URL shortening

URL shortening is a technique on the World Wide Web in which a Uniform Resource Locator (URL) may be made substantially shorter and still direct to the required page. This is achieved by using a redirect which links to the web page that has a long URL. https://en.wikipedia.org/wiki/URL_shortening If you glance at the address bar of your browser right now, you will see that […]

Categories
Theory

Networks

This post is aimed at the Matric Learner preparing for theory assessment: it covers work from the entire CAT syllabus. Much of this theory was covered in Grades 10 & 11 and should serve as revision. Definition: a (computer) network is defined as two or more computer devices connected to each other. The physical network […]

Categories
Theory

Making friends with CAT Theory

CAT is a living subject – you are surrounded by examples of computer technology all the time. The technology changes rapidly and you can keep up-to-date by simply being curious. The theory component of CAT should not be boring “book learning”. Almost without exception, you should be able to see examples of and experience the […]

Categories
Theory

Ransomware

Garmin Connect users across the globe lost access to all their online fitness data as a result of a Ransomware attack just this month (August 2020). This form of cybercrime is a relatively new development. Read more about this attack on TechRepublic. The following information about ransomware is an extract from “Clarification of existing content […]

Categories
Theory

Types of computer crimes

There is a fairly long list of ways in which people commit cybercrimes (crimes committed using computer technology). Some are simply mildly irritating, while others range from financially disastrous to life-threatening. A number of the following cybercrimes are categorised under the heading “social engineering”, which is defined as: “The use of deception to manipulate or […]

Categories
Theory

File properties, attributes & metadata

File properties, attributes & metadata are three very similar concepts that can easily be confused. File properties are the basic info about a file, such as file name (1), file location (2) and file size (3). You cannot edit these file properties – they are reported on by the operating system and only change when […]