Data security and integrity processes Flashcards

paper 2

1
Q

what do cyber attack vectors do

A

deliver malware/effect a malicious outcome eg obtaining personal data
is a pathway by which a hacker can gain access to computer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

virus

A

software which will attempt to spread over the network via infecting emails, removable storage devices etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

trojans

A

similar to virus but hidden in files or programs - when files open trojan is activated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

spyware

A

tracks key presses and software use to send back to hacker
commonly used of identification fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ransom ware

A

software that will delete, collect or encrypt files which they will ransom back

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

botnets

A

creates a back door to your computer allowing a hacker to use it without your permission
they can then use your computer to launch further attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

phishing

A

cybercrime in which target is contacted by someone posing as legitimate institution to lure them into providing sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

accidental damage

A

when employees move, delete or update files which they weren’t supposed to
as they are not predictable they are hard to protect against
tends to happen due to lack of training, insufficient security on key files and fatigue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

black hat hackers

A

break into systems for their own purpose eg financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

white hat hackers

A

use skills to break into system to expose flaws and advise on how to fix them (employed by company)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

grey hat hackers

A

white hat hackers that aren’t directly hired by company but perform penetration testing anyway to expose flaws (often for hopes of being hired)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is a contingency plan

A

plan to be enacted should a disaster happen
needs to be created, tested and maintained
needs to consider:
- what data is important
- frequency of backup needed
-can backups be automated
- can operations be moved to cloud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

components of a contingency plan

A

frequency of backup of systems
data stored off-site in secure location
alternative means of communication just in case
plan for retrieval of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

data security

A

techniques and technology intended to keep data safe from theft/deliberate corruption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

data integrity

A

keeping data intact and consistent even in a situation when some data is lost -done by keeping copies of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

security risks to modern systems

A

outside access of files
corruption of data
unauthorised reading/duplication
loss/deliberate deleting

17
Q

symmetric encyrption

A

single key used for both encryption and decryption of data
only trusted parties must know shared secret key

18
Q

symmetric encryption pros

A

quick to set up and easy to execute
faster

19
Q

symmetric encryption con

A

very easy for modern computers to crack using brute force

20
Q

asymmetric encryption

A

2 different keys:
public encryption key to send messages but only recipient has private decryption key to read messages

21
Q

asymmetric pros

A

much more secure as even if message is intercepted it cannot be read + harder to crack key

22
Q

asymmetric cons

A

very complex
much slower than symmetric
keys are harder to generate

23
Q

protection for systems often used

A

-clerical procedures eg removing USB ports to prevent theft of data and virus implantation
- levels of permitted access
- passwords

24
Q

cryptography (encryption)

A

techniques that render data unreadable to anyone beside intended recipient.

25
biometrics
the use of unique characteristics of a human body to generate biometric authentication and protect data security eg facial recognition finger prints etc
26
fingerprint recognition pros
low rate of errors using fingerprint scanner compared to other biometrics fingerprint unique to each person so good at IDing people modern tech detects blood flow so fake fingerprints won't work
27
fingerprint recognition con
false negative could come from age, dirt etc
28
iris vs retinal scanners
iris reads surface of the iris while retina reads layer of blood vessels behind the eye retina considered to be more effective as can authenticate those who are blind (or have lack of pigment in iris) retina is also more invasive as requires person to be very close to scanner
29
voice print recognition
measures pauses, accents as well as what they say used with few authenticated users errors arise from factors eg background noise
30
biometric pros
very hard to replicate data biometrics cannot be lost, stolen or forgotten like conventional passwords no one can trick you into revealing your biometric info faster and easy to identify
31
biometric cons
people change over time (aging, illness, injury) privacy concerns on use of the data if data is compromised user cannot replace it (eg get new finger) large amounts of data must be processed and stored for each use
32
penetration testing stages
involves trying to break into system by finding vulnerabilities 1. reconnaissance (finding info about system) 2. scanning 3. gaining access 4. maintaining access 5. clearing tracks