1.4.1 Keeping Data Safe Flashcards

1
Q

State the 3 types of threat to keeping data safe

A
  • Accidental Damage or Loss
    • Unintended corruption, deletion or damage to data that is usually caused by human error
  • Natural disaster
    • For example: floods, fires, hurricanes, tsunamis
  • Malicious Actions
    • Deliberate unauthorised actions intended to cause damage by viewing, deleting, copying or corrupting data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State 5 types of accidental damage

A
  • Human error - Data entry errors, accidental deletion, lose device…
  • Physical damage – Drop device and damage hard drive
  • Power failure/surge - electrical components damaged
  • Hardware failure - Hard disk crash
  • Software crashing – application crashes in middle of an operation and data lost
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give 3 examples of malicious actions on data

A
  • Hacking - unauthorised access leading to loss or damage
  • Malware – Malicious Software designed to corrupt or prevent access to data
  • Theft - Stealing data from devices or Data files that are are left unsecured
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give 3 examples of physical security

A
  • Issuing all staff with ID badges
  • Having all visitors to a building sign in on arrival
  • Having all visitors be escorted around the building
  • Keeping sensitive areas locked
  • Security guards
  • Biometric security e.g. fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

State 5 ways we can reduce risk to data?

A
  • Setting suitable access rights/user permissions
  • Encrypting data so that only authorized parties can understand the information
  • Password protecting individual files
  • Running regular backups, to another device or the cloud
  • Monitoring of staff computer activity
  • Install anti-virus/anti-malware/anti-hacking software
  • Keep all software, including operating systems, up-to-date
  • Use strong passwords and vary these for different websites
  • Make sure you are protected by a firewall
  • Verification can be used to get confirmation from a user e.g. deleting a file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are backups?

A

Data is backed up regularly so that data lost or corrupted can be restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is archiving?

A

The storage of data that is no longer needed for immediate processing, but needs to be kept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can we make our passwords secure?

A
  • Length: Use a minimum number of characters
  • Use a mixture of numbers, lowercase and uppercase characters
  • Include special characters such as &, !, #, %
  • Do not include your name, DOB or personal details
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an audit trail/log?

A
  • An audit trail maintains a record of all activity that has taken place on a computer system
  • Every time a user accesses the system, the time and date are logged along with their actions
  • It can assist in detecting security violations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly