Chapter 6 - Security, Privacy And Data Integrity Flashcards

(11 cards)

1
Q

Data security

A

Ensuring data is protected against loss and unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data integrity

A

Making sure that data is valid and does not corrupt after transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data privacy

A

Ability to determine what data is being shared with a third party

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data security vs system security

A

Protection of data on a computer system - protection of computer system
Prevent corruption of data & hackers from using data - prevent access of viruses & hackers to system
Eg. Encryption - eg. ID & password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats to computer and data security (4)

A

Malware
Hacking
Phishing
Pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware
Definition and types (2)
Risk restriction

A

Software intentionally designed to damage a computer or computer network
Includes Virus and Spyware
Ensure anti-virus and anti-spyware system is installed, regularly updated and run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus

A

Software that replicates itself by inserting a copy of itself into another piece of software, which may cause the computer to crash and can lead to deletion or corruption of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

Software that gathers information about users online and offline activity, including accessed sites, applications and downloaded files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacking
Risk restriction

A

Illegal access to a computer system, hackers can obtain users confidential data ad cause identity theft or can lead to the deletion or corruption of data
Risk restriction: use strong passwords and ensure firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phishing

Risk restriction

A

Attempt through emails to obtain user’s confidential data which can cause identity theft

Risk restriction : ignore suspicious mails and ensure firewall criteria includes spam filters, blacklist, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pharming

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly