Data Storage Requirements in relation to Security and Protection and how they help to prevent common threats Flashcards

10.1 Key Requirements of Legislation relating to the security of info and data (29 cards)

1
Q

What is a cyberattack?

A

Cyberattacks are malicious attacks with the intent to cause harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Who do cyberattacks target?

A

Government or national infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can cyber attacks also be referred to as?

A

cyberwarfare and cyberterrorism.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why do security steps need to be taken to protect the data from cyberattacks?

A

Security steps need to be take to protect data and reduce the risk of illegal access by cybercriminals e.g. bank details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the two biggest cyberattacks threats to businesses and organisations?

A
  1. Phishing
  2. Malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the cyberattacks potential indicators to look out for?

A
  • Spelling mistakes, on inappropriate use of language
  • Poor quality images or images of text
  • Fake links
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Phishing?

A

A type of spam email used by cybercriminals used to steal info from devise users by pretending to be somone the user trusts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some examples of ways phishing attacks are undertaken?

A
  • Email
  • Texts
  • Phone calls
  • Mail asking for the recipient to contact them.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are physhing attacks targeted?

A

No, they are sent to random individuals hoping that some will be fooled. however some attacks may be targeted at individuals who work in a specific organisation/business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are targated phishing attacks called?

A

Spear phising attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is malware?

A

Malware is malicious software designed by a cybercriminal to damage or disrupt computer software of hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do cybercriminals create mallware?

A
  • to impact the performance of a computer device by using up resources such as disk space or processing capacity to make the computer device run slowly.
  • to lock users out of their devices or allow illegal activities to be undertaken on the device without the user knowing.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the 2 most common types of malware?

A
  • Adware
  • Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Adware?

A

Forces unwanted or irritating advertising, such as pop-ups, to be displayed on a device when the user is online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Spyware?

A

It enables cybercriminals to monitor the actions of the device used without their knowledge (usually used to steal sensitive info like passwords or bank details)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is trojans and how does it get setup?

A

a type of malware, that attaches itself to the device start-up routine and monitors what the user does one the user connects to the internet.

17
Q

What do trojens allow the designer do?

A

It allows the individual who designed it to take control of the user’s device and steal, damage, or perfrom harmdful actions without the user realising.

18
Q

What is a virus and how is it setup?

A

A self-replication software usually transmitted through internet connections that attaches to an application, when the application in then used, the virus makes a copy of itself on the user’s device and will continue to run, or run every time the application is used.

19
Q

What do viruses do?

A

It can corrupt data or provide cybercriminals with access to the device.

20
Q

What are worms and how is it setup?

A

The are self-replicating, standalone application that does not require a device user to execute it. It is spread through network connections and looks for and exploits security vulnerabilities to install itself on other devices.

21
Q

How can you reduce the risk of a cyber attack?

A

ONLY REMEMBER 4-5:
* only store data for as long as it is needed.
* anonymise data to reduce access to non-essential info
* Providing regular training for staff on data protection
* using different emails for work and private
* reviewing access privileges for applications
* reviewing social media privacy
* reviewing the settings on mobile devices to restrict location access
* not buying or using pirated software
* keeping software up to date
* using strong passwords
* be aware of security risks on public Wi-Fi
* block unwanted cookies and pop-ups
* using multi-factor authentication

22
Q

What is Multi-Factor Authentication?

A

an account log-in process that requires a used to enter two or more pieces of evidence in order to gain access. also know as fwo-factor authentication.

23
Q

What other evidance might the user have to enter for multi-factor authentication?

A
  • answer a secret question (e.g. pets first name)
  • Entre a unique pin or code sent to their email or phone number
  • Provide biometric information (e.g. face recognition or fingerprint)
24
Q

What will backing-up data enable businesses and organisations to do?

A

to recover data quickly is it is lost and help if the data becomes corrupted.

25
How can businesses back-up their data?
for small businesses they can use portable hard drives. But for big businesses they may use a romote storage facility or cloud storage.
26
What is the Cloud Storage?
software and services which are made available to users via the internet, rather than being run onf the device itself or the organisation's own local servers.
27
What are the benefits and risks of AI (artificial intelligence)?
- saves time -saves money
28
What are the risks of AI (Artificial Intelligence)?
- for technology to hallucinate and produce a response containing misleading or false info which looks credible.
29
What does Hallucinate mean in terms of AI (Artificial Intelligence)?
When tech misinterprets data and the resulting output is inaccurate and doesn't make sense; this type of misinterpretation presents risks to the user if the output is not checked for accuracy before being used.