Protecting Data and Information Flashcards

1
Q

Access Levels

A

Different levels of permissions that determine the actions a user can perform within a system or on specific data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Rights

A

Permissions granted to users, specifying what actions they can perform on a computer system or specific files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accidental Damage

A

Unintentional harm or destruction to computer hardware, software, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accidental Loss

A

Unintended misplacement or deletion of data or files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anti-Virus Software

A

Programs designed to detect, prevent, and remove computer viruses and other malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backup and Recovery Procedures

A

Plans and processes for regularly saving and restoring data to prevent loss in case of system failure or data corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CAPTCHA

A

A security feature that requires users to complete a task to prove they are human and not a computer program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Chip & PIN

A

A security feature for credit and debit cards that requires users to input a personal identification number (PIN) along with a chip in the card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Contactless

A

A technology that enables transactions or data exchange by bringing devices close together without physical contact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cracking

A

Unauthorized attempts to bypass security measures, often associated with attempting to obtain passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Controller

A

An entity or individual responsible for determining the purposes and means of processing personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Integrity

A

The accuracy, consistency, and reliability of data throughout its lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Security

A

Measures taken to protect data from unauthorized access, alteration, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Subject

A

An individual to whom personal data relates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data User

A

An entity or individual that uses or processes data, often subject to data protection regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Denial of Service Attack

A

An attempt to make a computer or network unavailable to its intended users by overwhelming it with traffic or requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Digital Certificate

A

A digital document that verifies the identity of a website or individual and facilitates secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disaster Recovery Plan

A

Procedures and strategies to recover and resume operations in the event of a catastrophic event or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Encryption

A

The process of converting information into a code to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

File Permissions

A

Settings that determine who can access or modify files on a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Firewall

A

A security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

22
Q

Format Check

A

Verifying that data is in the correct format, preventing errors or inconsistencies.

23
Q

General Data Protection Regulation (GDPR)

A

A set of regulations designed to protect the privacy and personal data of individuals in the European Union.

24
Q

Hacking

A

Unauthorized access, manipulation, or exploitation of computer systems or networks.

25
Hashing
Converting data into a fixed-size string of characters, often used for data verification and security purposes.
26
Identity Fraud
Unauthorized use of someone else's personal information for fraudulent purposes.
27
Information Commissioner's Office (ICO)
The UK's independent authority that upholds information rights and promotes data privacy.
28
Internet Bot
Automated software designed to perform tasks on the internet, both legitimate and malicious.
29
Length Check
Verifying that data meets specified length requirements, preventing errors or inconsistencies.
30
MAC Address
Media Access Control address, a unique identifier assigned to a network interface for communication.
31
Malware
Malicious software designed to harm or exploit computer systems or data.
32
Man in the Middle Attack
A security breach where an attacker intercepts and possibly alters the communication between two parties.
33
Name Generator Attack
A type of cyber attack that exploits automated processes using randomly generated names.
34
Passwords
Secret combinations of characters used to access computer systems or accounts.
35
Phishing
Attempting to deceive individuals into revealing sensitive information by pretending to be a trustworthy entity.
36
Physical Access Control
Measures to restrict physical access to computer systems or data storage areas.
37
Port
A communication endpoint in a computer network, allowing data to be sent and received.
38
Presence Check
Verifying that required data or fields are filled or present.
39
Private Key Encryption
Encryption method that uses a private key to encrypt and decrypt data, ensuring secure communication.
40
Protocol
A set of rules governing how data is transmitted between devices in a network.
41
Public Key Encryption
Encryption method that uses a pair of public and private keys for secure communication.
42
Quarantine
Isolating or containing potentially harmful files or software to prevent them from causing harm.
43
Range Check
Verifying that data falls within specified numerical ranges, preventing errors or inconsistencies.
44
Ransomware
Malicious software that encrypts a user's files and demands payment for their release.
45
Real-Time Scanning
Continuous scanning for viruses or malware as files are accessed or modified in real-time.
46
Shouldering
Unauthorized individuals observing or obtaining sensitive information by looking over someone's shoulder.
47
Spyware
Software designed to secretly collect information about a user's activities without their knowledge.
48
Trojan
Malicious software disguised as legitimate software to deceive users into unknowingly installing it.
49
Type Check
Verifying that data is of the expected type, preventing errors or inconsistencies.
50
Virus Definition
A database of known virus characteristics used by antivirus software to detect and remove threats.
51
Viruses
Self-replicating and harmful software that infects other programs and can cause damage to computer systems.
52
Worm
A type of self-replicating malware that spreads across computer networks without user interaction.