2.4 Securing Data & Systems Flashcards

(67 cards)

1
Q

Document Creation Software

A

Used for letter writing like word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Collaboration of Documents

A

Allow users to work together on documents by discussing changes on the screen all the time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Support Workflow

A

Allows managers to set tasks for individuals with completion times and can track which tasks have been completed within a wider project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electronic Signatures

A

Simply as it states including scanned signatures and tick boxes with statements
Enhanced electronic signatures are uniquely linked to the signatory and the signature is created with a private key which is only available to the signatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sharing Documents via Email

A

Documents can simply be sent as email attachments rather than sending them by conventional mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enterprise Content Management

A

System designed to manage an organisation’s documents. Unstructured information - including word processing documents, spreadsheets, PDF documents and scanned images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Systems to manage stock

A

1) product is scanned
2) price is displayed on the screen
3) deduct one form the stock level
4) re-stock level reached
5) automatically reorder of stock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Managements Information System

A

This system is a collection of hardware and software acting as the backbone of an organisations operations. MIS collects data from multiple online systems, analyses the information reports on data to help make management decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smart Devices

A

Smart light bulbs, smart thermostat, smart doorbell & smart locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Home Streaming

A

Video streaming - Amazon & audio streaming like Spotify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pilot Method

A

A small scale implementation of a digital system perhaps in one part of the office with a set of users, one department or one branch, main benefit of pilot method is risk reduced
- Advantages:
All features of the new system can be used fully & staff from the pilot can help train other staff
- Disadvantage:
Slower than other methods & no back up system for the department taking part if anything goes wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Parallel Method

A

Introducing the new system and it runs alongside the old system at the same time but people can revert back to old system if needed
- Advantage:
If a problem arises, users can return to use the old system & new system is available immediately
- Disadvantage
Having two systems can cause confusion & it’s expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Big Bang

A

Digital system implementation is where a company starts using the new system immediately
- Advantages
Cost effective and has shorter implementation time
- Disadvantage
Full testing is difficult before implementation & no fall back system if the new system has problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Passive Digital Footprint

A

Data collected without the users knowledge, a data trail unintentionally left online so people can see your IP address and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Active Digital Footprint

A

Data intentionally submitted online like posting on social media, sharing locations on apps and agreeing to install or accept cookies when browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Employers monitoring their Employees

A
  • monitoring online access and what they post on social media
  • see if they have written anything inappropriate or rude
  • access to their search history
  • see what potential employees do
  • also see number of hours someone works
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Changing Working Practices

A
  • increased amount of new jobs such as social media manager, computer game programmer and cyber text analysis
  • job losses due to technology such as cashier jobs and travel agents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Collaborative Working

A

You can work at the same time online remotely on the same document as other members of staff like Google meets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Teleworking

A

Working online, you can use VOIP (voice over internet protocol) to make voice calls over the internet (rather than a telephone company’s wiring)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Video Conference

A

Skype/Zoom/Google Meets (remember online lessons) lets you see and speak to everyone at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Digital Divide

A

The gap between those who have broadband and those who don’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Those with Broadband

A
  • educated
  • urban
  • rich
  • higher speed phones/computers
  • higher speed connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Those without Broadband

A
  • uneducated
  • rural
  • poor
  • lower speed on phones/computer
  • lower speed connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Retraining and Upskilling

A

The best people are those with an understanding of the traditional roles being replaced by technology, in such a scenario, retraining and upskilling can offer new roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
B2B (business to business)
Businesses exchange products, services and information with another business
26
EDI (electronic data interchange)
The paperless electronic interchange of business documents between companies in a standard format
27
Advantages of B2B & EDI
- orders processed quicker - staff are released to undertake higher value tasks like customer service - costs are reduced due to spending less time filming/searching - using less paper is better for environment
28
B2C (business to customer)
Business selling services and products to consumers
29
C2C
Consumer to consumer
30
Online Marketing
Platform business use to sell, rather than creating your own website, a number of companies offer use of their sales platform to sell products - Etsy or Amazon
31
Advantages of Online Marketing
- creating shop is a quick process - no need to pay for design or website costs - reduces market cost - no need to install or maintain payment methods
32
Disadvantage of Online Marketing
- bad/fakers views cause an impact - company does not have much control over website design/branding - subscription costs can be high £1000+ per month
33
Online Shopping Advantages & Disadvantages to customer
- can purchase products 24/7 - you can track package - save travel and transport costs - don’t know quality of what your buying - customers receive spam emails after creating account - shopping experience lost
34
Online Shopping Advantages & Disadvantages to business
- sell goods 24/7 - customers from all around the world - don’t need to pay for physical shops - keeping bank details secure - bad/fake reviews affect sales - issues with delivering goods
35
Blanket Emails
Sent to all the customers on the database
36
Targeted Emails
Promoting specific products that have been targeting using mining methods and new customers are buying + using emails lists
37
Social Media Marketing
Posting on social media promotes a product or service
38
Influencer Marketing
Giving a positive opinion on a product
39
Data Mining
Companies analyse the data they hold about customers, to target people the correct ads and products to predict trends
40
Search Engine Optimisation
When customers search for a product, companies want their products to be one of the first results and achieved through website design
41
Accidental Damage
When you accidentally delete a file or overwriting of a file, leaving a laptop on a train would lead to loss of hardware and potentially loss of data
42
Malicious and Deliberate Damage
A disruptive employee deleting data on purpose
43
Viruses
Programs that can replicate themselves and spread from one system to another by attaching to a host file - used to alter or pollute information on a targeted computer system Worms are self replicating programs and can remotely infect the device
44
Malware
Short for malicious software, malware is term used to describe software used t disrupt computer operation. Viruses, worms, key-logger and trojans all count
45
Phishing
Deception by using a kind of social engineering where a network user is deceived to reveal personal or secret information
46
Social Engineering
Psychological manipulation of people into revealing personal or confidential information. One common method is to use social media to get people to reveal their personal details
47
Brute Force Attacks
Attempting a combination of usernames and passwords repeatedly to gain access to a computer system
48
Denial of Service Attacks (DoS)
Prevention of access to system by regularly sending huge amounts of messages, usually emails, asking a network or server to authenticate a request that has no valid return address. This can be from one computer or a network of computers, with or without the user’s knowledge
49
Data Interception/Hacking
Once a hacker has accessed a system using any or all of the methods above, they can operate in several ways - preventing access and claiming a ransom to provide access to the computer system - data theft (stealing data from user)
50
Security Measures
Such as encryption and encoding data either symmetrically (weak) or asymmetrically (strong) in order to prevent access to information
51
Symmetric Encryption
Key for encryption and decryption is the same (Caesar’s cypher), simple and fast but is weak as it’s possible to figure out the pattern
52
Asymmetric Encryption
Everyone has a public key so if you send an encrypted message you use the public key. A secure system because you don’t need to send the key - more complicated = slower to decrypt
53
Firewalls
A network security system that monitors incoming and outgoing traffic based on predetermined rules
54
Anti-virus Software
A program that can be loaded into the memory when the computer is running. It monitors activity on a computer system, looking for signs of virus infection
55
Hierarchical Access Levels
Assigning different levels of system access to users depending on their role. User access levels are one method used to grant certain users access and/or write access to data on a computer system
56
Cyber Resilience
A company’s ability to prepare, survive, respond to and recover from a cyber attack - Consequences • permanent of temporary loss of data and information • damaged or corrupt software • websites going offline with need of repair • loss of reputation that has been built • loss of comparative advantage • financial loss
57
Boundary Firewall & Internet Gateway
Firewall helps to block external threats or attacks from accessing the system in the first place, monitoring all network traffic and can identify and block unwanted traffic that could damage your computer, system and networks
58
Secure System Configuration
Admin accounts, adult trails, account management and backups
59
Restricted Access to Valuable Data
Only limited number of staffs with high bevel access will be able to edit, delete, add or access data
60
Malware Protection
Ensuring that there is a robust firewall with antivirus programs installed on every machine which is regularly updated, web filters can be installed to block inappropriate websites and intrusion detection systems, informing staff of an issue
61
Patch Management
Companies will publish a patch to ensure the latest updates are applied to all machines
62
Ensuring known Vulnerabilities are Dealt with
Technical staff need to keep the system updated and install updates as they are published
63
Implementing Staff Training
To ensure staff are not putting data at risk so they are fully informed
64
Good Disaster Plan
- exploring what if situations? - regular backups - having arrangements for use of alternative premises, communication methods and facilities
65
GDPR
Personal data must be - processed lawfully and fairly - collected for specified, explicit and legitimate purposes - adequate, relevant and limited to what is necessary for purposes for which it is processed - accurate and kept up to date - kept for no longer than necessary - held securely; protected against unlawful processing, loss, destruction
66
Computer Misuse Act 1990
- access data without permission and looking at someone else’s files - access computer systems without permission like hacking - alter data stored on a computer system without permission like writing a virus with erases data intentionally
67
Investigatory Power Act 2016
Prevent or detect crime, prevent public disorder, ensure national security and public safety, investigate or detect any abnormal or unlawful use of telecommunication systems