LO6 Flashcards

(82 cards)

1
Q

What are the three key principles of data security?

A

Confidentiality, Integrity, Availability

These principles are protected under legislation such as the Data Protection Act (2018).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does ‘confidentiality’ mean in the context of data security?

A

Information should only be accessed by individuals or groups with the authorisation to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How can an organisation uphold confidentiality?

A

Using protection measures like usernames and passwords, tiered levels of access or permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does ‘integrity’ mean in the context of data security?

A

Information is maintained so that it is up-to-date, correct and fit for purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How can an organisation preserve the integrity of its data?

A

Carrying out regular data maintenance, using record-locking in spreadsheets or databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does ‘availability’ mean in the context of data security?

A

Information is available to the individuals or groups that need to use it and should only be available to those who are authorised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can an organisation keep its data available?

A

Ensuring staff have the correct privileges, storing data online (e.g. cloud storage).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Fill in the blank: Information should only be accessed by individuals or groups with _______.

A

authorisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

True or False: Data must be kept safe from unauthorized access.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Fill in the blank: Regular data maintenance helps ensure the information is _______.

A

up-to-date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are two methods to limit access to sensitive data?

A

Using usernames and passwords, tiered levels of access or permissions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a potential risk of making additional copies of information?

A

It could be lost or stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of record-locking in data management?

A

To prevent multiple persons from editing data at the same time, ensuring correctness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the security principle of confidentiality?

A

Data should only be viewed by individuals with the authorisation to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two main reasons why data may be viewed by unauthorized individuals?

A
  • Espionage
  • Poor information management
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define espionage in the context of data security.

A

The act of collecting data to use against an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What can result from poor information management regarding data access?

A

Data may be insecurely stored or too many people may have access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What legal act is breached if personal data is accessed without authorization?

A

The Data Protection Act (2018)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does accidental data loss refer to?

A

Information being irretrievably lost, including the original version.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

List two reasons for accidental data loss.

A
  • Equipment failure
  • Human error
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a consequence of accidental data loss?

A

It could delay dependent processes such as analysis and trend recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is intentional destruction of data?

A

Purposely damaging an organisation by deleting or denying access to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Give two examples of intentional destruction of data.

A
  • Viruses that corrupt data
  • Ransomware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What could happen if data destruction is ignored and unreported?

A

It could result in a huge loss of trust when revealed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is intentional tampering with data?
Changing data so that it is no longer accurate.
26
Provide an example of intentional tampering with data in education.
A student or teacher changing exam answers for a better grade.
27
What can result from data tampering being discovered?
Loss of reputation as the organisation cannot be trusted to report data accurately.
28
Fill in the blank: Data security methods and protection systems will need to be reviewed if data has been _______.
tampered with
29
What could happen to employees who tamper with data?
They may be fired and face legal action.
30
What is the largest data breach in the history of the internet?
The Yahoo data breach affecting 3,000,000,000 accounts.
31
What was the consequence of the Yahoo data breach?
Loss of reputation and trust among users.
32
What does 'Intellectual Property' refer to?
Anything that an organisation or individual has designed, developed, or created themselves ## Footnote Examples include manuscripts, artwork, primary data, blueprints, and reports.
33
What is the impact of losing intellectual property for an organization?
Competitors could use it to their advantage, and the effect of announcements could decrease if leaked ## Footnote Example: HBO's Game of Thrones episodes were leaked before the air date.
34
What happens if usernames and passwords are stolen?
Individuals may be unable to access paid services and can be locked out of their accounts ## Footnote Example: A hacker might change the password of an account.
35
What is a DDOS attack?
A malicious attack that prevents users from logging into a web page or online service.
36
What is 'Confidential Information'?
Information of a highly sensitive nature that requires secure storage and protection.
37
What are potential consequences of breaching confidential information?
Loss of reputation, legal consequences, fines, court cases, and imprisonment ## Footnote Violations of the Data Protection Act (2018) may lead to penalties from the ICO.
38
What is the risk of losing third-party data for organizations?
Loss of reputation, trust, and potential legal proceedings if sensitive data is lost ## Footnote Example: Cloud storage providers storing user data can face backlash if hacked.
39
How can data loss affect an organization's reputation?
It can destroy trust and loyalty, causing customers to choose competitors.
40
What is identity theft?
When an attacker uses a victim's personal information for fraud or impersonation.
41
What are the consequences of identity theft for the victim?
Financial loss, difficulties with credit checks, and the need to cancel transactions.
42
What could be the implications of losing classified national security data?
Disastrous consequences, including targeting by spies or terrorists, and potential economic threats.
43
List three recent examples of security failures.
* Virgin Media * Boots * Marriott Hotels * Facebook Messenger
44
Fill in the blank: If confidential information is breached, it could lead to a loss of _______.
[reputation]
45
Fill in the blank: A _______ attack prevents users from accessing online services.
[DDOS]
46
Why is it important for staff to know their responsibilities in information security?
Staff spend the most time handling and amending data, so they must have confidence in their role to ensure data protection. ## Footnote Clear assignment of responsibilities helps in accountability if data is lost.
47
What should organizations consider about staff access rights to data?
Organizations need to limit access to sensitive data to reduce the risk of loss or tampering. ## Footnote Only those who need the data for their job roles should have access.
48
What is a key component of training for staff regarding data security?
Staff should be trained in basic data security techniques and how to protect data from unauthorized access and loss. ## Footnote This training helps ensure that employees are equipped to handle information securely.
49
What types of disasters should be included in a disaster recovery policy?
Natural disasters, hardware failure, software failure, and malicious damage. ## Footnote Examples include fire, flood, virus damage, and hacking.
50
What is the first step in a disaster recovery policy?
Analyze all possible risks to identify weaknesses. ## Footnote This analysis helps in preparing effective preventative measures.
51
What preventative measures can be taken before a disaster occurs?
Making rooms flood-proof and storing important data at different locations. ## Footnote These measures help mitigate the impact of potential disasters.
52
What should staff do during a disaster according to the disaster recovery plan?
Follow training to protect data and implement contingency plans. ## Footnote This includes actions like uploading data to cloud storage.
53
What recovery measures should be followed after a disaster?
Use backups to repopulate systems, purchase replacement hardware, and reinstall software. ## Footnote Updating and improving disaster recovery policies is also essential.
54
Why should organizations conduct information security risk assessments periodically?
To ensure physical and logical measures are up-to-date and effective. ## Footnote This helps identify weak points and fix vulnerabilities.
55
List some specific cost impacts related to data security.
* Software (e.g., security software) * Hardware (e.g., secure storage devices) * Training (e.g., hiring experts) * Security (e.g., hiring staff for server protection) ## Footnote These costs are necessary to ensure the security of data and systems.
56
Fill in the blank: Staff should be trained in _______ to protect data.
[basic data security techniques] ## Footnote This training is crucial for handling information securely.
57
True or False: All staff should have access to sensitive data.
False ## Footnote Access should be limited to those who need it for their job roles.
58
What does RFID stand for?
Radio-frequency identification ## Footnote RFID uses electromagnetic fields to attach tags to physical objects.
59
What are examples of 'dumb' objects that can have RFID tags embedded?
* Clothing * Packages * Animals ## Footnote These objects can have RFID tags for tracking and management.
60
How is RFID used with security tokens?
To permit access of authorised people to certain areas ## Footnote An example includes ID keycards.
61
What is the purpose of shredding?
To cut up documents into small pieces so they cannot be reassembled and read ## Footnote Sensitive data on paper or optical disc should be shredded when no longer required.
62
What is the role of locks in physical security?
To prevent access to server rooms or sensitive data stores ## Footnote Only authorised personnel with the right key will have access.
63
Why should backups be stored at a secure location away from the main site?
To ensure they are not affected by damage to the organisation's building ## Footnote Backups can also be stored on cloud servers.
64
What do biometric devices require for access?
The input of a human characteristic ## Footnote Examples include fingerprint, iris, or voice scan.
65
How does a biometric device verify a user?
It checks the biometric data against previously inputted data in a database ## Footnote A match will allow access to the user.
66
What is the role of security staff in protecting data?
To physically prevent unauthorised access to sensitive areas ## Footnote They may check ID keycards or use surveillance like CCTV.
67
Fill in the blank: Backups should be taken regularly and stored at a _______.
secure location ## Footnote This practice helps protect data integrity.
68
True or False: RFID can only be used for tracking equipment.
False ## Footnote RFID is also used for access control with security tokens.
69
What is logical protection?
Using digital methods of security to protect computer systems and data. ## Footnote Logical protection includes various techniques such as usernames, passwords, firewalls, and encryption.
70
Why are usernames and strong passwords necessary?
To minimize the chances of unauthorized users accessing a system. ## Footnote Strong passwords help protect user accounts from being compromised.
71
List three rules for choosing a strong password.
* Mix of uppercase and lowercase letters * Include punctuation and numbers * Minimum of 8 characters in length
72
What is the purpose of anti-virus software?
To scan a system and remove viruses. ## Footnote Viruses can delete data or permit access to unauthorized users if not addressed.
73
What does anti-spyware software do?
Removes spyware on an infected system to prevent hackers from viewing personal data. ## Footnote Spyware can monitor users without their consent.
74
What should organizations do regarding anti-virus and anti-spyware programs?
Install and regularly update them.
75
What is the role of a firewall?
To prevent unauthorized access to or from a network. ## Footnote Firewalls filter data packets and can block harmful content.
76
How do firewalls filter data?
By blocking anything identified as harmful to the computer system or network.
77
What are the two types of encryption?
* Encryption at rest * Encryption in transit
78
What is encryption?
The conversion of data (plaintext) into an unreadable format (ciphertext). ## Footnote This protects data from being understood if intercepted.
79
What is the purpose of tiered levels of access?
To grant different types of permission to certain users.
80
What are the three levels of file access?
* No access * Read-only * Read/write
81
What is obfuscation?
Deliberately changing data to be unreadable to humans but understandable by computers. ## Footnote It is often used to protect program code from rival programmers.
82
Provide a scenario where obfuscation would be used.
To stop rival programmers from viewing and stealing program code.