6 security, privacy and data integrity Flashcards

(35 cards)

1
Q

data privacy

A

privacy of personal information stored on a computer, that should not be accessed by unauthorized parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

data protection laws

A

laws which govern how data should be kept private and secure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

data security

A

methods taken to prevent unauthorized access to data and to recover data if lost or corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

user account

A

authenticates user by using username and password, allowing an individual to use a computer or network server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

authentication

A

way of proving somebody is who they claim to be

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

access rights

A

use of access levels to ensure only authorized users can gain access to certain data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malware

A

malicious software that wants to damage or gain unauthorized access to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

firewall

A

software or hardware that sits between a computer and external network that monitors and filters all incoming and outgoing activities
- checks against allow list
- blocks transmissions that do not meet criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

anti- spyware software

A

detects and removes spyware programs installed illegally on a users computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encryption

A

data is turned into cipher text so it cannot be understood without decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

biometrics

A

use of unique human characteristics to identify a user (facial recognition, fingerprint) as part of the password system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

anti virus software

A

-checks files before they are loaded
- compare possible viruses against a database of known viruses
- quarantine files which are possibly infected

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hacking

A

illegal access to a computer system without the owners permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

malicious hacking

A

intention of deleting or corrupting files to gain personal detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ethical hacking

A

authorized by company’s to check their security measures and how robust their computer systems are to resist hacking attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

viruses

A

programs that can copy themselves with the intention of deleting or corrupting files causing the computer to malfunction

17
Q

worms

A

type of standalone virus that can replicate itself with the intention of spreading to other computers

18
Q

logic bombs

A

code embedded in a program on a computer. when certain conditions are met, they are activated such as deleting files or sending data to a hacker

19
Q

trojan horses

A

malicious programs disguised as legitimate software with intent of carrying harm to users computer system

20
Q

bots

A

not always harmful, can be used to search automatically for a system on the internet. can cause harm by launching attacks and taking control over computer system

21
Q

spyware

A

software that gathers information by monitoring

22
Q

phishing

A

legitimate looking emails designed to trick the recipient into giving their personal data to the sender

23
Q

pharming

A

malicious code installed on a users computer. the code redirects the user to a fake website without their knowledge to gain personal data

24
Q

dns cache poisoning

A

altering IP addresses on a DNS server by a pharmer or hacker with the intention of redirecting a user to their fake website without

25
data validation
method used to ensure entered data is reasonable and within given criteria
26
types of data validation tests
type - checks wether nonnumeric data was input in a numeric only field range - checks data is within upper and lower limit format - checks wether data is entered in correct format length - checks wether data has the required number of characters presence - checks to make sure field is not empty existence- checks if data in file or file name actually exists limit check- checks only one of the limits ( upper or lower) consistency check- checks wether data in two or more fields match up correctly uniqueness check - checks that each entered value is unique
27
data verification
ensures data is the same as original by using double entry or visual check
28
double entry
data is entered twice using two different people, then compared
29
visual check
manually compare entered data with the original document
30
check digit
additional digit appended to a number to check if entered data is error free
31
modulo 11
-each digit in the number is given a weighting number -the digit is multiplied by its weighting number and each value is added to make a total - the total is divided by 11 and the remainder is subtracted by 11 - value generated is the digit used, if it is 10 then X is used
32
checksum
method to check if data has been changed or corrupted after data transmission
33
parity check
method used to check if data has been transferred correctly that uses even or odd parity
34
automatic repeat request (ARQ)
-uses acknowledgment (a message sent out to the receiver indicating that data has been received correctly) -timeout (time interval allowed to elapse before acknowledgment is received
35
data integrity
ensuring consistency of the data