Cyber Security Flashcards
1
Q
What must data be protected from?
A
- Loss - no longer on storage device
- Corruption - damaged/changed
- Unauthorised Access - no permission
2
Q
What is hacking?
A
Accessing and changing data without permission. Gaining unauthorised access to ICT systems.
3
Q
Unauthorised access violates these key issues:
A
- Privacy - seen or copied only by people with permission
- Integrity - changed only by people with permission
4
Q
5 computer crime examples
A
- Piracy - illegal copies of software
- Hacking
- Creating and distributing malware
- Identity theft - stealing someone’s info and pretending to be them
- Damage & theft of physical hardware and storage media
5
Q
2 ways of protecting data security
A
- tech - use of hardware and software to protect computer systems
- practices and procedures - taking protective/preventive action