Data Security Flashcards

(33 cards)

1
Q

What is data?

A

Raw facts and figures with no meaning. When put into context, data becomes information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three types of personal data?

A

Volunteered data, observed data, inferred data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a data breach?

A

Unauthorized access to sensitive, protected, or confidential data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name two consequences for organizations after a data breach.

A

Financial loss and reputational damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What law gives people the right to access public information in Scotland?

A

Freedom of Information Act (Scotland).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does GDPR stand for and why is it important?

A

General Data Protection Regulation — it gives individuals rights over their personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name two types of encryption.

A

Symmetric encryption and asymmetric encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the purpose of a firewall?

A

To block unauthorized access to or from a private network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is cyber hygiene?

A

Regular habits and practices to maintain system health and improve online security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are ‘Crown Jewels’ in cybersecurity?

A

Critical business data essential for survival, like client information or designs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the Caesar Cipher?

A

A basic encryption method where letters are shifted by a set number.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social engineering?

A

Manipulating people into giving up confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can strong passwords be created?

A

Use at least 12 characters, mix upper/lower case, numbers, and special characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is phishing?

A

Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy source.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Give one reason why encryption is important.

A

It keeps data private even if intercepted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are examples of cyber threats faced by companies?

A

Data theft, ransomware, website disruption.

17
Q

Name two roles in a company’s cybersecurity team.

A

Chief Information Security Officer (CISO), Penetration Tester.

18
Q

What are the two UK government-backed cybersecurity certification schemes?

A

Cyber Essentials and Cyber Essentials Plus.

19
Q

What are the two main principles of cybersecurity in business?

A

Prevention and Recovery.

20
Q

What is risk management in cybersecurity?

A

Reducing risks to information assets and protecting a business from cyber threats.

21
Q

Name two types of security besides cybersecurity.

A

Physical security and perimeter security.

22
Q

What is metadata in a digital photo?

A

Hidden data such as time, location, and device info.

23
Q

What is a brute-force attack?

A

Trying every possible key or password until the correct one is found.

24
Q

What is a Keyword Cipher?

A

An encryption method that uses a secret keyword to rearrange the alphabet.

25
What is the difference between a small and a large company's cyber defenses?
Large companies usually have dedicated cybersecurity teams; small companies often have limited resources.
26
Name two common causes of a data security breach.
Weak passwords and phishing attacks.
27
What does ISO 27001 focus on?
Implementation of an Information Security Management System (ISMS).
28
What should you avoid doing when using public Wi-Fi?
Avoid making sensitive transactions like banking.
29
What is cyber resilience?
An organization's ability to continue operations during and after a cyberattack.
30
Give one impact of a data breach on an individual.
Identity theft, financial loss, emotional stress.
31
Name one famous data breach case.
Yahoo - 3 billion accounts compromised.
32
What does a firewall protect against?
Unauthorized access to or from a private network.
33
How can businesses prepare for a cyberattack?
By implementing a business continuity plan.