2.8 Data Security Flashcards
(30 cards)
What are the key risks to files for most companies with an online presence?
Outside access and manipulation of files.
Unauthorised reading or copying of files.
Corruption of files.
Loss or deliberate deleting of files.
What protection can be applied to files?
Levels of permitted access.
Passwords for access.
Write-protect mechanisms.
What is Cryptography?
The act of scrambling a piece of plain text into cipher text so that it can’t be immediately understood. (Practically known as encryption)
What is a Caesar Cypher?
The simplest and most well known form of encryption where each letter in the alphabet is shifted a certain number of places.
What is Symmetric Encryption?
Where the process of decryption is the opposite process used to encrypt. These algorithms have one key which is needed at both ends of a transmission.
What is an advantage and disadvantage of Symmetric Encryption?
Symmetric is best used for data on your own disks as its fast however, they are very easy for modern computers to crack.
What is Asymmetric Encryption?
Algorithms which have two keys - a private and a public key. If someone knows the encryption key, they can encrypt information but they can’t decrypt it.
What is an advantage and disadvantage of Asymmetric Encryption?
A shared secret key doesn’t have to be exchanged over an insecure medium such as the internet however, asymmetric keys are far slower to use and are not feasible for use in transmitting large amounts of data.
What is a biometric device?
A device which adds security to a computer system which works with unique features of the human body.
What are 5 examples of biometric security?
Fingerprint Recognition.
Iris Scanning.
Retina Scanning.
Facial Recognition.
Voiceprint Recognition.
What are the key stages of deploying biometric security?
Captured.
Digitised.
Stored.
Compared.
What are some examples of Facial Recognition being used?
Used by the police at football grounds to check for known trouble-makers.
City centre drunkenness patrols.
Shopping centre CCTV.
Airport Security.
What are 4 examples of issues associated with the use of biometrics?
If innocent people’s faces are stored by the police that could cause privacy issues.
Physical/Eye damage from repeated flash photography.
Concerns around the use of personal data.
Criminals could gain access if original data capture was flawed.
What 3 situations could prevent Voiceprint Recognition from working?
High background noise.
Cold/Sore Throat.
Recording and playing back of the original voice to gain unauthorised access.
What are 3 advantages of the use of biometrics?
Biometrics are unique to a person.
Very difficult to copy, steal or imitate.
It is not possible to forget as you don’t have to remember a card or PIN.
Why is disaster planning important for an organisation?
Many organisations could not survive if their system went down as their data is vital.
Planning is a must as all computer systems are liable to fail as you can’t always avoid fires/floods.
What are 5 procedures that should be utilised for disaster planning?
Backups should be made.
Files should be archived off-site.
There should be an alternative system that can quickly replace the existing one.
Should be back-up power supplies.
Staff should be trained in recovery procedures.
What are Black hat hackers?
Hackers which break into systems for their own purposes.
This could be for financial gain, testing their skills or for fun.
What are White hat hackers?
Hackers which use their skills to break into a system to expose flaws and then advise on how they will be fixed.
They will work directly for a company, or hired by a company to perform penetration testing.
What are Grey hat hackers?
White hat hackers who are not directly hired by a company but perform penetration testing anyway to expose flaws.
This is in hope to be hired by the company but more often than not they are prosecuted under the computer misuse act.
What is Penetration Testing?
Done by all three types of hackers which involves breaking into a system and exploring vulnerabilities in the Operating System, application flaws, poorly configured systems and user behaviour.
What are the 5 phases of Penetration Testing?
Reconnaissance.
Scanning.
Gaining Access.
Maintaining Access.
Clearing Tracks.
What is Reconnaissance?
Collecting as much public data as possible. This could include the software in use, names of employees, IP addresses and other such data.
What is the Scanning process in Penetration Testing?
The plan is to scan all available ports, find software versions, find out the addresses of all public computers and create a blueprint of the target.