Impact of IT on Data Handling Flashcards

1
Q

Name 3 Potential threats

A
  1. Threats to hardware
  2. Threats to software and Data
  3. Unauthorised Access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3 threat to hardware

A

Theft
Damage to equipment
Disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3 Threats to software and Data

A

Theft
Damage to hard drive
Corrupt file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2 unathorised Access threats

A

Employees whom dont have access to sensitive information
Visitors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 Measures to minimise the risk off a Physical Threat

A
  1. Buildings have secure locks and alarms
  2. Keeping accurate inventory
  3. Use cameras to monitor
  4. Have fire fighting equipment
  5. Ensure the business has insurance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name the 6 Things that Minimise he risk to software and data keeping

A
  1. Access levels
  2. Passwords
  3. Encyryption
  4. Firewalls
  5. Antivirus software
  6. Company Policies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe Access levels

A

Staff should have different access rights to diferent folders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe Encryption

A

Encyrypting a file is an added layer of Security which means the file cant be read without he correct passphrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe a Firewall

A

Software which sits between the internet and the network. It analyses the incoming and outgoing traffic and trys to intercept threats .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe a Anti virus software

A

Prevents dangerous programs from being installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3 Things

How are Paper based files kept secure?

A
  1. Locked in a cabnited or a restricted Area
  2. Ensure any files are put away a the end of the day and are not laying around
  3. Any infromation that is no longor needed must be shredded.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

2 consequenes of Data security breach

A
  1. Personal data may be in hands of criminals
  2. Organisations will recieve bad publicity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advantages & Disadvantages of Networks

A

Advantages
1. Organisations save money on equipment
2. Cuts costs
3. Simpleer to back up one large server than each indivual computer
4. Easier to monitor a network than individual computers

Disadvantages
1. Intial costs are high and so ar maintenance costs
2. Staff may need to be trained
3. Viruses can affect whole server
4. Easier for hackers to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly