LU7 - Errors, Threats and Security (Protocols) Flashcards
(37 cards)
Human Errors GIGO
Garbage in Garbage Out
If invalid data is entered the output will be invalid
Rounding Arithmetic error
Numbers are rounded, accuracy is lost on the decimal places after the rounding took place
Truncating Arithmetic Error
Truncating a real number to an integer loses all decimal values
Fixed Number Of Bits Arithmetic Error
The number of bits available determines the highest and lowest number that can be contained.
If number is outside of that range, it cannot be stored
Overflow Arithmetic Error
This is related to the number of bits available for a particular data type. Calculations that result in answers that exceed the maximum value will still be stored, but the answer will be incorrect
Data Transmission Errors
If data doesn’t reach its location in the same condition it was sent, there was probably corruption.
- Atmospheric conditions
- Attenuation
- Magnetic or electrical interference
Programming errors
Responsible for catastrophic failure of systems, can cause loss of life
or
syntax errors
mistakes in the source code, such as spelling and punctuation errors, incorrect labels
logic errors
A logic error is classified as a type of runtime error that can result in a program producing an incorrect output. It can also cause the program to crash when running.
runtime errors
Occurs when a program is syntactically correct but contains an issue that is only detected during program execution.
Verification
A systematic process for evaluating performances and compliance of a set of data
By checking
Completeness
Correctness
Cosistency
RFID
Use of radio signals to transfer data from a tag attachment to an object
No power is required as the tags are read using magnetic fields
ACCCR
Accuracy
Correctness
Currency
Completeness
Relevance
Accuracy
Degree to which the stored value measures against the true value
Correctness
Data is correct if it confirms to an approved or conventional standard or agreeing with fact, logic
Data can be valid, but incorrect
Currency
Data is current if it is up to data or not outdated
Completeness
data is complete if all required data is known
Relevance
Data is relevant to a situation/problem scenario and can contribute to providing meaningful information about the situation/problem
Hardware Failure
Component can no longer perform its task and a chain reaction of other important tasks not being able to be performed
Storage
The inability to read data from the hard drive can render a computer useless
Power failure
Data Damage
Possible diaphragm damage
A surge is usually stopped by a electrical circuit breaker outside computer, found in POWER SUPPLY UNIT (PSU)
Malware
Networks are susceptible to malicious software entering environment
by going through firewall or through software sources (Flash Drive or portable media
Phishing or Spoofing
A convincing email sent to user to click on link
Identity theft, fraudulent email activity where parts of email look like it was sent from someone else
Virus
A virus attaches itself to a program or file that is then pread from one computer to another leaving a copy of itself
Trojan Horse
Is a seemingly harmless program that when activated causes harm to computer
Spyware
Software that spies on computer, can capture information.
web browsing habits, email messages, usernames and passwords
Pharming
Is an intended attack to redirect a websites traffic to another fake site