Data Security Flashcards
(33 cards)
What is data?
Raw facts and figures with no meaning. When put into context, data becomes information.
What are three types of personal data?
Volunteered data, observed data, inferred data.
What is a data breach?
Unauthorized access to sensitive, protected, or confidential data.
Name two consequences for organizations after a data breach.
Financial loss and reputational damage.
What law gives people the right to access public information in Scotland?
Freedom of Information Act (Scotland).
What does GDPR stand for and why is it important?
General Data Protection Regulation — it gives individuals rights over their personal data.
Name two types of encryption.
Symmetric encryption and asymmetric encryption.
What is the purpose of a firewall?
To block unauthorized access to or from a private network.
What is cyber hygiene?
Regular habits and practices to maintain system health and improve online security.
What are ‘Crown Jewels’ in cybersecurity?
Critical business data essential for survival, like client information or designs.
What is the Caesar Cipher?
A basic encryption method where letters are shifted by a set number.
What is social engineering?
Manipulating people into giving up confidential information.
How can strong passwords be created?
Use at least 12 characters, mix upper/lower case, numbers, and special characters.
What is phishing?
Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy source.
Give one reason why encryption is important.
It keeps data private even if intercepted.
What are examples of cyber threats faced by companies?
Data theft, ransomware, website disruption.
Name two roles in a company’s cybersecurity team.
Chief Information Security Officer (CISO), Penetration Tester.
What are the two UK government-backed cybersecurity certification schemes?
Cyber Essentials and Cyber Essentials Plus.
What are the two main principles of cybersecurity in business?
Prevention and Recovery.
What is risk management in cybersecurity?
Reducing risks to information assets and protecting a business from cyber threats.
Name two types of security besides cybersecurity.
Physical security and perimeter security.
What is metadata in a digital photo?
Hidden data such as time, location, and device info.
What is a brute-force attack?
Trying every possible key or password until the correct one is found.
What is a Keyword Cipher?
An encryption method that uses a secret keyword to rearrange the alphabet.