6 Security, Privacy And Data Integrity Flashcards

1
Q

Data privacy

A

The privacy of personal information, or other information stored on a computer, that should not be accessed by unauthorised parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data protection laws

A

Laws which govern how data should be kept private and secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data security

A

Methods taken to prevent unauthorised access to recover data if lost or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

User accounts

A

An agreement that allows an individual to use a computer to network server often needed a username or password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

A way proving somebody or something is who/what they claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Access rights

A

Use of access levels to ensure only authorised users can gain to certain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malware

A

Malicious software to seeks to damage or gain unauthorised access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Firewall

A

Soft wear or hardware that sits between a computer and external network that monitors and filters all incoming and outgoing activites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Anti-spyware software

A

Soft wear that detects and removes spyware programs installed illegally on a users computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption

A

The use of encryption keys to make data meaningless without the correct decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Biometrics

A

Use of unique human characteristics to identify a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hacking

A

Illegal access to a computer system without the owners permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malicious hacking

A

Hacking done with the sole intent of cuasing harm to a computer system or user e.g deleting files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ethical hacking

A

Hacking used to test the security systems and vulnerabilities of a computer system, and is carried out with the permission of the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Legitimate looking emails designed to trick a recipient into giving their personal data to the sender of the email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pharming

A

Redirecting a user to a fake website in order to illegally obtain personal data about the user

17
Q

DNS cache poisoning

A

Altering IP addressed on a DNS server by a Pharmer or hacker with the intentions of redirecting a user to their fake website

18
Q

What are the data laws

A
  1. Fairly and lawfully processed, 2. Processed for the stated purpose, 3. Adequate, relèvent and not excessive 4. Accurate, 5. Not kept longer then necessary, 6. Processed in line with data subject rights, 7. Kept secure, 8. Not be transferred to another country unless with adequate protection
19
Q

Characteristics or strong password

A

A least one capital letter, a least one numerical letter, and at least one special character

20
Q

Tasks carried out by a firewall

A
  1. Examine and monitor traffic between a computer and a public network, 2. Preventing access to certain undesirable sites, 3. Warning the user of a potentially harmful external source, the user is given an option to allow the source
21
Q

What are the limitations of a firewall

A

Can prevent user within the internal network from bypassing the modem, cant control employee misconduct and carelessness, cant prevent user on standalone computer buying the firewall

22
Q

What is antivirus software

A

A piece of software which constantly monitors for virus attacks

23
Q

What are the talks carried out by anti virus software

A
  1. Checks software of files before they are run or loaded on a computer, 2. Compare possible viruses against a list of already known ones, 3. Checks software for disease related behaviour, 3. Quarantines files or programmes which are possibly infected
24
Q

Data integrity

A

The accuracy, completeness and consistency of data

25
Q

Validation

A

Method used to ensure entered data is reasonable and meets a certain input criteria

26
Q

Verification

A

Method used to ensure data is correct by using double entry or visual checks

27
Q

Check digit

A

Additional digit appended to a number to check if entered data is error free

28
Q

Modulo - 11

A

Method used to calculate a check digit based on Modulus divison by 11

29
Q

Checksum

A

Verification method used to check if data transferred has been altered or corrupted, calculated form the block of data to be sent

30
Q

Parity check

A

Method used to check if data has been transferred correctly that uses even or odd parity

31
Q

Parity bit

A

An extra bit found at the end of a byte that is set to 1if needed to agree with a parity protocol

32
Q

Odd parity

A

Binary number with an odd amount of 1 bits

33
Q

Even parity

A

Binary number with an even amount of 1 bits

34
Q

Parity block

A

Horizontal and verticale parity check on a block being transferred