CHAPTER 6 Flashcards

(30 cards)

1
Q

Data Protection Law ( Guide )

A
  • Fairly and lawfully processed
  • Only process for stated purpose
  • Data must relevant and not excessive
  • Data must be accurate
  • Not kept longer than necessary
  • Process in accordance with right
  • Data must be kept secure
  • Data not be transferred to other country unless the country has adequate protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data integrity ?

A
  • Validity of data
  • Freedom of error
  • Data is accurate
  • Data is up to date
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data security ?

A
  • Protect data from illegal access
  • Protect data from lost and data can be recovered if lost
  • Deals with data protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are user account used for ?

A
  • ## To authenticate a user ( Prove )
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is use of password ?

A
  • Accessing email account
  • Carrying out online banking or shopping
  • Accessing social networking sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How to protect password ?

A
  • Run anti-spyware software
  • regularly change password
  • Make hard password
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does strong password contain ?

A
  • Capital letter
  • Numbers
  • Symbol
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital signature

A
  • Protect data by providing a way of identifying the sender
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is data privacy ?

A
  • To keep the data private
  • Only use for the purpose agreed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Threat to data and computer system

A
  • Individual , careless
  • Internal mismanagement , theft
  • Natural disaster , flood
  • Unauthorized access into system , hackers
  • Malicious software , virus
  • System weakness , power failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A
  • Malicious software that has the intention of causing harm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus

A
  • Triggered to replicate itself inside
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worm

A
  • Run independently and transfer itself to other network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Logic bomb

A
  • Stay inactive until some condition met
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan horse

A
  • Downloaded as useful program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A
  • Collect information and transmit
16
Q

Malware ( Activity involve )

A
  • Phishing
  • Pharming
  • Keylogger
17
Q

Comparison between virus , worms and trojan horse

A
  • How infection
  • How reproduction
  • How trigger
  • How Attack
  • How spread
18
Q

Security measures to protect computer

A
  • Disaster recovery
  • Safe system update
  • User authentication
  • Firewall
  • Good practice
  • Malware detection software
19
Q

Disaster recovery

A
  • Ensure the system continuously working
20
Q

Safe system update

A
  • Replacement of a new system
  • Keep original system
21
Q

User authentication

A
  • Best practice for creating multiple user account
  • Verification of a user’s identity
    ( Password , Biometric , Security token )
22
Q

Firewall

A
  • Hardware/Software that monitor and control network traffic
  • Act as security gate
23
Q

Good Practice

A
  • Not leaving computer unattended
  • Privately accessing the computer
  • Do no write details ( Password )
24
Malware detection software
- Install antivirus - Do regular scanning
25
Reason for data lost
- Malware attack - System crash - File is erased - Disk corrupted - Damaged disk - Location of the file forgotten
26
Backup procedure
- Incremental backup , overnight - Full backup , weekend - Backup disk is stored away from the system - Disk mirroring strategy
27
Security measure for data
- Anti-virus software - Malware detection - Backup policy - Encrypted data
28
Data validation technique
- Length - Range - Character - Format - Presence - Limit - Type - Existence
29
Verification method
- Parity check - Check sums