Security And Data Management Flashcards

1
Q

Give an example of an encryption technique.

A

XOR, SHA256 and Blowfish

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is original data converted into when a complex encryption technique is applied?

A

Cyphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is lossless compression?

A

It compresses data into a form that may be decompressed at a later time without any loss of data, returning the file to its exact original form.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Give a lossless compression example.

A

The word the, is the most frequently used word in the English language.

@ word @, is @ most frequently used word in @ English language.

The string ‘the’ takes 3 bytes, and this is shortened to 1 byte.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you calculate the compression ratio?

A

Original file size
_______________________

Compressed file size

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is lossy compression?

A

It discards data to reduce the amount of data that needs to be stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Acceptable use

A

They set out rules, including a list of unacceptable types of website that should not be visited and activities that are not allowed on the network, such as gambling and installation of unauthorised software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Disaster recovery

A

A policy that gives procedures in the event of a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Give examples of disasters that are valid in disaster recovery.

A

Fire, flood, lightning, terrorist attacks

Hardware failure (like power supply unit failing)

Software failure (like virus damage)

Accidental and malicious damage (like hacking)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 3 parts to a disaster recovery policy?

A

Before a disaster: Risk analysis, preventative measures and staff training.

During the disaster: Staff response - implementing contingency plans.

After the disaster: Recovery measures, purchasing replacement hardware, reinstalling software, restoring data from backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Backups

A

A backup policy sets out how often and to what medium backups are made.

It’s typical that 3 previous backups are kept, the grandfather, the father and the son. When a new backup is made, the grandfather is overwritten and becomes the new son. This is called the grandfather-father-son method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Archiving

A

Data held on computer systems is often archived, storing data no longer frequently used, being held for security, legal or historical reasons. This frees up resources on the main computer system and allows faster access to data that is in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name the 4 different types of malware

A

Viruses (replicate themselves and spread across computer systems)

Worms (self-replicating, identify vulnerabilities in operating systems and enable remote control of the computer)

Spyware (downloaded software, collects user’s data without knowing)

Trojans (useful programs, but provide a backdoor enabling data to be stolen)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

6 ways to protect yourself from malware

A
Anti-virus software
Firewall
Up to date operating system
Latest versions of web browsers
Avoiding phishing emails
Malicious software removal tool
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Examples of acceptable use contents

A

Includes a list of unacceptable types of websites which shouldn’t be visited.

Includes a list of activities that are not allowed on the network (gambling, installation of unauthorised software).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly