Topic 26 - Protecting data: tools and techniques Flashcards

1
Q

Why are tools and techniques used?

A
  • There are many tools and techniques we can use for protecting data stored and transferred using IT systems.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are software and hardware used?

A
  • Software and hardware tools are one important approach, as well as techniques and processes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the techniques used for promoting data?
(Techniques for protecting data)

A
  • Back and recovery procedures
  • Passwords
  • Physical access control
  • Digital certificates
  • Protocols
  • File permission and access levels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Back and recovery procedures ensure?
(Techniques for protecting data)

A

Back and recovery procedures - Ensure that data can be recovered following any loss of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Passwords?
(Techniques for protecting data)

A

Passwords - Limit access by ensuring users keep a secure password to access system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does Physical access control prevent?
(Techniques for protecting data)

A

Physical access control - Prevent unauthorised access using locks, biometrics, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does Digital certificates allow?
(Techniques for protecting data)

A

Digital certificates - Allow secure data transfer using public key encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Protocols mean?
(Techniques for protecting data)

A

Protocols - Define data transfer processes to ensure secure transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What Protocols File permission and access levels ensure?
(Techniques for protecting data)

A

File permission and access levels - Ensure access is restricted to those who need it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does Biometric authentication identify?
(Techniques for protecting data)

A

Biometric authentication - identifies individual’s unique fingerprint patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 3 tools for protecting data?
(Tools for protecting data)

A
  • Antivirus Software
  • Firewalls
  • Encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the description of Antivirus Software?
(Tools for protecting data)

A

Detects and removes viruses and other malware from a computer systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the reason for using Antivirus Software?
(Tools for protecting data)

A

Protects systems from all forms of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What do you need to be aware of when using Antivirus Software?
(Tools for protecting data)

A

Must be regularly updated new viruses are created regularly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the description of Firewalls?
(Tools for protecting data)

A

Monitors network traffic into and out of an IT system; block suspicious traffic to prevent unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the reason for using Firewalls?
(Tools for protecting data)

A

Firewalls are key in preventing hacking attempts as well as worms

17
Q

What do you need to be aware of when using Firewalls?
(Tools for protecting data)

A

Firewalls are not 100% effective - security holes can be exploited, e.g. in outdated software

18
Q

What is the description of Encryption?
(Tools for protecting data)

A

The conversion of data into an unreadable code known as ciphertext

19
Q

What is the reason for using Encryption?
(Tools for protecting data)

A

The most effective form of security, as encrypted data cannot be read without the encryption key

20
Q

What do you need to be aware of when using Encryption?
(Tools for protecting data)

A

Encryption keys must be maintained and kept secure. A lost key means the data is irretrievable

21
Q

Why do we encrypt hard disk?
(Encryption of stored and transmitted data)

A
  • We encrypt our hard disk so that anyone who gains access to our system (a hacker, or someone accessing a stolen device) cannot read our stored data.
22
Q

Why do we encrypt data while is is being transmitted?
(Encryption of stored and transmitted data)

A

We encrypt data while it is being transmitted so that if it is intercepted it cannot be read