Data Security Flashcards

1
Q

List some of the consequences of data loss for a business. (p. 290)

A
  • Penalties or prosecution.
  • Income loss.
  • Expose trade secrets to competitors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List four different ways to physically protect data. (p. 290)

A
  • Securely store laptops and tablets when not in use.
  • Lock doors and windows to prevent hardware theft.
  • Power off desktop computers when not in use.
  • Limit access to trusted individuals
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List four different ways to limit threats to software. (p. 290)

A
  • Virus - Prioritize safe downloads and scan for viruses.
  • Worm - Use firewalls to monitor and block suspicious program activity.
  • Trojan horse - Train users to spot unusual requests and use firewalls for detection.
  • Spyware - Carefully review terms when downloading free software and consult spyware information sites.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe the three different ways to backup files. (p. 290)

A
  • Full backup: Copies all device files, done periodically.
  • Differential backup: Copies changed files since last full backup.
  • Incremental backup: Copies only the data that has changed since the last backup.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly