B061- Keeping Data Safe and Secure Flashcards Preview

ICT BO61 > B061- Keeping Data Safe and Secure > Flashcards

Flashcards in B061- Keeping Data Safe and Secure Deck (26)
Loading flashcards...
1

What is a backup?

A backup is a copy of a file containing the current data.

2

What are the rules for backing up files?

Make backups regularly, make more than one backup, use sensible names for your backups, keep each backup separate fro the others, use a removable medium to save backups, store the backups carefully and safely.

3

Describe the backup system used in business,

Businesses often use tape drives with magnetic tape for their backup files.

4

Describe the backup system used in business.

Businesses often use tape drives with magnetic tape for their backup files. The tapes are used in rotation. They should have recovery plans to restore lost or damaged data.

5

What is an archive?

An archive is a copy of data that is stored separately for permanent safekeeping.

6

Give four differences between backups and archives.

Data in a backup file is in current use whereas data in an archive file is not. Backups are made at frequent intervals but archives are made at longer intervals. Backups can be used for disaster recovery however archives are of little use in disaster recovery. Backups are not useful for reference/research; archives can be used for reference/research.

7

Give four differences between backups and archives.

Data in a backup file is in current use whereas data in an archive file is not. Backups are made at frequent intervals but archives are made at longer intervals. Backups can be used for disaster recovery however archives are of little use in disaster recovery. Backups are not useful for reference/research; archives can be used for reference/research.

8

Define an unauthorised user.

A person who does not have permission to use, read or have access to computer files.

9

Give three ways that data can be misused.

By gossiping with others about friends or customers, by selling contact details to advertising companies, by using other peoples personal data to obtain money or goods.

10

Give two things that criminals may use another person's personal details to do.

Obtain a bank debit card or credit card. Use the card to buy items or services.

11

What is identity theft?

When someone uses the details of another person to pretend to be them.

12

Give as many ways as you can think of to prevent unauthorised users from seeing other peoples data.

a

13

Give as many ways as you can think of to prevent unauthorised users from seeing other peoples data.

Don't allow others to see what keys you press when typing, keep computers in secure rooms, do not store data on laptop computers, keep removable media safe, have a unique user identity, use passwords properly, encrypt files etc.

14

What are the following protective measures an example of?Computer rooms should not be on ground floors. Doors should have locks and windows should have bars, computers and laptops should be securely fixed to desks.

Physical security.

15

What is the purpose of a username and password?

A username identifies who the user is and the password verifies that they are who they say that they are. It is a way of preventing unauthorised access to a computer.

16

What does encryption do? Why is a decryption key needed?

Encryption scrambles data so that it cannot be understood unless it is unscrambled. A decryption key is needed to unscramble the data and public key encryption is used to scramble data for transmission over public networks.

17

What is hacking?

Hacking is the act of gaining or attempting to gain access to computer data or systems without the required passwords or access rights.

18

Describe what is meant by 'key logging'.

Key logging is the use of software to record the keys pressed to access data or computer systems. The recording are transmitted yo other people who may then use then to access the data or systems.

19

What is the use of a firewall?

A firewall is used to control access to a network or an individual computer system.

20

What is the use of a firewall?

A firewall is used to control access to a network or an individual computer system.

21

What is a virus?

A software/code/program that copies itself, transmits itself to other computers without the user's knowledge or permission and can alter, delete or otherwise damage the data in files stored on the computer system.

22

What is a worm?

Computer programs that copy themselves and use networks to spread without any external help.

23

What is a trojan horse?

A software application that seems to perform a useful task or job but may allow unauthorised access to a user's computer system.

24

What is spyware?

Collects information without a user's knowledge or consent.

25

What is adware?

Automatically downloaded and installed to advertise or to direct a user to advertising material.

26

Name five preventive actions to avoid malware from gaining access to a computer system.

Installing antivirus software and updating it regularly, not downloading files from sites that are not genuine, not sharing files with others, not using other people's removable media, not accessing the internet.