Cyber Security Flashcards

1
Q

What must data be protected from?

A
  • Loss - no longer on storage device
  • Corruption - damaged/changed
  • Unauthorised Access - no permission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is hacking?

A

Accessing and changing data without permission. Gaining unauthorised access to ICT systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Unauthorised access violates these key issues:

A
  • Privacy - seen or copied only by people with permission
  • Integrity - changed only by people with permission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

5 computer crime examples

A
  • Piracy - illegal copies of software
  • Hacking
  • Creating and distributing malware
  • Identity theft - stealing someone’s info and pretending to be them
  • Damage & theft of physical hardware and storage media
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 ways of protecting data security

A
  • tech - use of hardware and software to protect computer systems
  • practices and procedures - taking protective/preventive action
How well did you know this?
1
Not at all
2
3
4
5
Perfectly