6 Security & Ethics Flashcards

1
Q

What does data loss mean?

A

Data loss means that data no longer exists in storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data corruption?

A

Data corruption is when the data has been damaged or changed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is unauthorized access?

A

Unauthorized access is when data is edited or deleted be people who didn’t have permission to see or alter the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does integrity mean?

A

Integrity means the data is protected from unauthorized changes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does privacy mean?

A

Privacy means that you data is only viewed or copied by people that have permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hardware fault?

A

A hardware faults happen when the computer is not well built or it has been damaged.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a software fault?

A

A software fault is when data is corrupt of lost because the software didn’t work properly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are external threats?

A

External threats might include floods, earthquakes or social unrest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are executable files?

A

Executable files are files that perform functions when you click on the file and they cannot be viewed because they are compiled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does DoS stand for and what does it do?

A

DoS stands for Denial of Service attack and it oveloads your computer(with messages from one account so it can be blocked) and it slowes down your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does DDoS stand for and what does it do?

A

DDoS stands for Distribute Denial of Data attack. It is similat to DoS however it is harder to stop because a lot of messages are sent not only from one account but hundreds if not more.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

By whom would a DDoS or a DoS attack com from?

A

The attack would come from someone who wants to protest against the company or simply attack it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is identity theft?

A

Identity theft is a crime and it happens when someone finds out personal infromations about you and will use it against you.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What tricks might people use to get personal data from you?

A

Phishing happens when someone sends you a message that is disguised as a message from a company and asks you to respond to personal questions.
Pharming is when someone makes a fake website and when you log on and enter really personal data like bank details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a biometric check?

A

A biometric check is when a part of your body is used to confirm identity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Physical properties might a biometrick check scan?

A

Finger print
The pattern if your Iris.
Features of your eyes: the distance between your eyes.
And others.

17
Q

What does LAN stand for and what does it do?

A

LAN stands for Local Area Network and it connects all the computers in an area so that people can share programs and data ON THAT LAN.

18
Q

What does a router do?

A

The router can be connected to the LAN and the LAN than can join the internet.

19
Q

What are hubs?

A

Hubs are LANs.

20
Q

What does a proxy do?

A

A proxy handles the connection between two computers or networks.

21
Q

What does a firewall do?

A

The firewall scans all the data that goes in and out of the local network for malware.

22
Q

What is OSI?

A

OSI is a way of grouping protocols in seven layers.

23
Q

Which are the seven layers in which OSI stores the protocols?

A
  1. Physical layer
  2. Data link layer
  3. Network layer
  4. Transport layer (TCP, IP)
  5. Session layer
  6. Presentation layer
  7. Application layer
24
Q

What does TLS stand for and what does it do?

A

TLS stands for Transport layer security is a security protocol and it basically encrypts the information that is sent.

25
Q

What are the 2 parts of TLS?

A

TLS record protocol - a method to break down the communication(message) into smaller parts called records.
TLS handshake protocol - establishes a private link between the two computer if the other device is genuine so that they will have the same protocols and so that they can communicate.

26
Q

What does e-commerce mean?

A

E-commerce means buying or selling on the internet.

27
Q

What does teleworking mean?

A

Teleworking means when someone is working from home.

28
Q

What is a certification authority?

A

CA(certification authority) is an organization that everyone trusts and it checks the digital certificats that show if the other device is safe. It plays a big role in TLS.

29
Q

What does SSL stand for and what does it do?

A

SSL stands for secured sockets layer and it is an earlier version of TLS however it is not as secure.

30
Q

What is the difference between cypher text and plain text.

A

Plain text is a normal text and isn’t that secure. A cypher text is a text that is encrypted and it can be read only by someone who has the encryption key.

31
Q

What is an encryption key?

A

An encryption key can be a string of text or numbers that tells the computer how to encrypt and decrypt.

32
Q

What is symetric incryption?

A

Symetric encryption is when the key is secret and only the sender and reciever know the key.

33
Q

What happens in asymetric encryption?

A

In asymetric encryption there is a public key and a private key.
The public key can be downloaded by everyone, but it can only encrypt
The private key can only decrypt however it is not shared.

34
Q

Which encryption is faster and which is safer symetric of asymetric?

A

Symetric is faster, but asymetric is safer.

35
Q

Name 3 internal threats

A

Hardware faults
Software faults
Human error

36
Q

Name three malpractices.

A

Leaving the computer logged on when you leave.
Telling someone else your password.
Using work computer for personal business because the company loses valuable work time.