Chapter 6 - Security, Privacy And Data Integrity Flashcards
(11 cards)
Data security
Ensuring data is protected against loss and unauthorised access
Data integrity
Making sure that data is valid and does not corrupt after transmission
Data privacy
Ability to determine what data is being shared with a third party
Data security vs system security
Protection of data on a computer system - protection of computer system
Prevent corruption of data & hackers from using data - prevent access of viruses & hackers to system
Eg. Encryption - eg. ID & password
Threats to computer and data security (4)
Malware
Hacking
Phishing
Pharming
Malware
Definition and types (2)
Risk restriction
Software intentionally designed to damage a computer or computer network
Includes Virus and Spyware
Ensure anti-virus and anti-spyware system is installed, regularly updated and run
Virus
Software that replicates itself by inserting a copy of itself into another piece of software, which may cause the computer to crash and can lead to deletion or corruption of data
Spyware
Software that gathers information about users online and offline activity, including accessed sites, applications and downloaded files
Hacking
Risk restriction
Illegal access to a computer system, hackers can obtain users confidential data ad cause identity theft or can lead to the deletion or corruption of data
Risk restriction: use strong passwords and ensure firewall
Phishing
Risk restriction
Attempt through emails to obtain user’s confidential data which can cause identity theft
Risk restriction : ignore suspicious mails and ensure firewall criteria includes spam filters, blacklist, etc
Pharming