16. Data security and integrity process Flashcards

1
Q

What are some potential threats to computer systems?

A
  • natural disasters
  • hardware failure
  • software failure
  • malicious damage
  • accidental damage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a hacker?

A

A person who attempts to gain unauthorised access to a computer system with the intent of damaging data or somehow harming that system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a black hat hacker?

A

A hacker who attempts to gain access to data via immoral means, typically to steal company secrets or cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a white hat hacker?

A

Security experts employed by a company who try and find vulnerabilities in a system and fix them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a grey hat hacker?

A

A hacker somewhere in between a white and a black hat hacker, they attempt to find vulnerabilities in systems but are not employed. What they do is technically illegal but they do not cause or have any intentions to cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is malware?

A

Computer code written with the intent to frustrate or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of malware?

A
  • trojan
  • worm
  • keylogger
  • virus
  • spyware
  • botnets
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a trojan?

A

A piece of malware that disguises itself as something harmless, but it causing damage in the background.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a worm?

A

A standalone piece of malware that replicates itself and spreads to other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a botnet?

A

A network of private computers that are infected with malware without the owners’ knowledge so that they can be controlled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a keylogger?

A

A piece of malware that records every keystroke of a user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spyware?

A

A piece of malware that obtains information from a device by transmitting data from their device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a virus?

A

Pieces of code that are capable of copying themselves and are typically to have a detrimental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a denial of service attack (DoS)?

A

When an attacker floods a server with useless traffic, causing the server to overload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a distributed denial of service attack (DDoS)?

A

When multiple systems orchestrate a synchronised attack from many locations at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are levels of permitted access?

A

Certain users have different access to certain parts of a system.

17
Q

What are write-protect mechanisms?

A

Only certain users have permission to write/edit data stored on a system.

18
Q

What are access rights?

A

Access to confidential files is only available authorized users.

19
Q

What is encryption?

A

The process of turning plain text into an unreadable form by using an algorithm and a unique key. Only users with the key will be able to translate the text into a readable form. This will not prevent you from being hacked, but if a hacker obtains encrypted text, they will not be able to read it without the unique key.

20
Q

What is a firewall?

A

A piece of software and/or hardware that prevents certain traffic from passing through it. It can block certain types of traffic, and also inspect data travelling across it to see if it looks suspicious.

21
Q

What is antivirus software?

A

Software that regularly scans files for possible infection by malware.

22
Q

What is accounting/auditing software?

A

All files accessed by a user are recorded in a log.

23
Q

What is redundancy?

A

When a single site is brought down, other sites can work to make up the shortfall.

24
Q

When contingency planning, what should be done before a disaster?

A
  • conduct a risk analysis to identify possible risks
  • ensure preventative methods are available e.g. backups
  • provide staff training to deal with disasters
  • ensure that if a disaster happens, loss of data is minimized
25
Q

When contingency planning, what should be done during a disaster?

A
  • implement contingency plans to prevent further damage to data
  • begin immediate recovery of data
26
Q

When contingency planning, what should be done after a disaster?

A

Get things running back to normal and restore all possible data.
If needed:
- purchase replacement hardware
- reinstall software
- restore data from backups