Threats to Data Topic D Flashcards

1
Q

What is a trojan

A

A piece of malware that allows the hacker to gain full control of the users computer, this is commonly diagnosed via emails as the hacker pretends to be a reliable source when its not causing harm for the user’s PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is spyware

A

A piece of malware that is installed onto the computer which allows the hacker to gain small amount of data each time, this makes it harder for the user to know if they have it installed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a worm

A

A self replicating programme which uses the network to send copies of itself to computers on the network, this can be done due to security weakness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Phishing

A

A email fraud method where hackers send out a authentic looking email pretending to be another organisation to gain personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is accidental damage

A

This is where the user causes the damage the system unintentionally, this can be dropping the computer, leaving the device open, not saving any work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can access levels prevent damage to the computer

A

This has permissions on a users system depending on what role they have, for example a student can view and alter their own documents but can se others and also has limitations on what software they can use, teachers can see students documents but not other teachers but has more software permissions that students, admin has full control and can add pupils, assign roles or delete documentations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How can back up and recover prevent damage to your files

A

This is to keep data up to date and in case of your system crashing or work being lost, it can be recovered from the latest back up. There is various types of back ups such as incremental which saves only new data, full which saves the entire document again, differential back ups which is basically the same as incremental.

Son, back up happens once a day
Father the earliest one for that week happens once a week
Grandfather, earliest one of that month saves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can passwords protect your data

A

This gives more security as it adds more details the user must know to get into the account, when picking a password it must be long, not relate to anything personal include multiple different characters and changed regularly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can physical access control protect data

A

This is a security technique for who and what the user can access in an environment, there is a wide range of physical access controls:

Access control cards, these cards have a magnetic strip that gives you access to a certain environment if you own the car but cannot enter without

Keypads, the system has a code which the user who has permission will know, if they know the code they can type it in the key pad and gain access, if not they will be denied

Biometric scans, this scans biometric data to see if you have permission to enter or not, this can be face id, finger print, iris scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can digital certificated protect data

A

This is a method of guarantee which the organisation can purchase to prove their authenticity, this can be seen on emails (encrypted) and the internet , when googling a site if it has a padlock it means it is safe and owns a digital certificate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can protocols protect data

A

This is a set of rules when transmitting data between different devices on a network. There is several protocols such as SSL and TSL (more modern), This provides a secure connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can file permissions protect data

A

This provides a set of permissions the user has over the document. Read only allows the user to only view the document but can not to anything else, this is beneficial as it can stop users from altering data or erasing it, Read and write, this gives the user the access to alter the text and also view it and full control, this allows the user full control over the document and can do what ever they want to it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How can anti-virus help prevent damage done to the computer

A

This uses signature detection and heuristic scans to analyse the pattern and if anything unusual is seen the software will alert the user they have a virus diagnosed onto the system, this software can remove existing viruses off the computer and protect data, when using antivirus software you can schedule how regular you want the software to scan your computer (scheduled scans). When using this you need to ensure it is regularly maintained and updated to prevent any viruses not being removed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can firewall protect data

A

This is a programme that uses packet filtering to spot unsafe data entering the computer, if any data is unsafe the computer blocks access to the website protecting the user, this is beneficial as it stops viruses being diagnosed onto the system whereas anti virus software alerts once it has already been diagnosed which can be too late

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can encryption protect data

A

This codes a piece of data which prevent the hacker from seeing the original data, this can be coded using a private key and can only be decoded using the same key ,if lost the data can not be converted again resulting in lost data, there is also a public key which is used when transmitting data to another user, this can prevent data being intercepted during transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is difference between asymmetric encryption and symmetric encryption

A

Asymmetric encryption is used with a public key and is commonly used when transmitting data to another user, symmetric encryption is encrypting data using a private key