Lo1 Flashcards

1
Q

what is cyber security?

A

Its is how organizations and individuals protect their information, assets, data, software and hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the CIA triad?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is Confidentiality?

A

only allowing people that need to know to access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Integrity?

A

the data is up to date accurate and trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is Availability

A

Is the data readily available to those who need it when they want it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what is a cyber security incident?

A

An occurrence that compromises the confidentiality, integrity or availability of data or information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is unauthorised access?

A

Gaining access to a computer system, network, data and programs without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Information disclosure?

A

Some one normally on the inside of a system a trusted person tells people information that should be confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Information disclosure?

A

Reviewing or reading data
information or systems
documentation without
permission of the appropriate
owner or manager.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Unauthorised modification?

A

changing data, information, programs
or documentation without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Unauthorised disclosure?

A

Allowing information to pass
to any person or organisation
without permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Modification of data?

A

Changing or deleting of data this can be done illegally if the person doesn’t have permission to when modified illegally used for blackmail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Inaccessible data?

A

When users are denied access to data this could be an attack to stop people from getting data to slow down a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can happen if people access your health records?

A

Refusal of personal insurance
Loss of job opportunities.
Altering records to give a false impression
Using the record to obtain benefits illegally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can happen if people access your name and address?

A

Interception of mail allowing access to further detailed information
Ordering of goods to be sent to your address and intercepting their delivery or selecting the option of sending the goods to another address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens if people access your bank details?

A

Creation of mortgages, bank accounts and loans without your knowleage
Withdrawal of funds
Closure of legitimate accounts.

17
Q

Why dose a company need to protect employees and customer data?

A

Data protection act and it would give the company a bad name and reputation and would disrupt business.

18
Q

Why is it important to protect intellectual property?

A

If access or disclosed ownership of any innovation could be disputed, resulting in expensive court
cases.