Topic D - Protecting Data and Information Flashcards

1
Q

What does antivirus do?

A

Detect any suspicious programs and remove them before they can cause problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does antivirus detect malware?

A

Scanning newly added files and software, as well as through regularly scheduled scans of storages devices connected to your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What will take anti virus longer?

A
Size of storage device
Amount of data being used
How defragmented hard disk is
Applications running
Existing malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a firewall?

A

Monitors the traffic coming into and out of your computer systems via it ports over a network to look for anything suspicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do firewall prevent harm?

A

Blocks off any suspicious data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is malicious software?

A

A computer program that is designed to harm or gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 types of malware?

A

Viruses
Worms
Trojans
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are viruses?

A

A program that copies and insert itself into programs running on your computer system (spreads when programs/data is attached and passed to another system).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are worms?

A

A program that copies and inserts itself into programs running on your computer system (spread through a network and find security holes in systems to gain access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are trojans?

A

A harmful program that masquerades as a legitimate software application (spreads by users downloading it thinking its a program).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a spyware?

A

A malicious program that monitors user activity for the purpose of stealing personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What impact does malware have on individuals and organisations?

A

Can be used to corrupt and delete data on IT systems, which mean they have to spend time recovering data from backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a hacker?

A

Someone who gains unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are white hat hackers?

A

They test systems for security flaws by attempting to gain access to help check the security procedures of an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the impact of hackers on individuals and organisations?

A

Unauthorised access can be used to steal financial, personal or business information.
The data can also be used for blackmail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is meant by the term phishing?

A

Where emails or messages are sent to pretend to be from a reputable company but in fact they are not instead they are a malicious user who have the purpose to gain personal or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the impact of phishing on individuals/businesses?

A

The personal or financial information obtained can be used for stealing money or identity fraud or hacking into the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is accidental damage?

A

Where IT systems or data are harmed through human error, such as dropping a device or accidentally overwriting important files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What 7 techniques are there for protecting data?

A
File permissions
Access levels
Backup and recovery procedures
Passwords
Physical access controls
Digital certificates
Protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does file permissions do?

A

You can set who can access the files and what they can do with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What 3 files permissions can you set?

A

Read only
Write only
Full control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is read only?

A

Files can be opened and viewed, but not edited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is read/write?

A

Files can be opened, viewed, edited, modified and deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are access levels?

A

Control what software, data and services a user can access.

25
What is the highest access level?
Administrator access.
26
What is administrator access?
A user can access all folders with full control, alter the permissions of other users and can install and delete software.
27
What can the lowest access level do?
A user can only access a limited number of files and the software they need to do their job.
28
What are backups?
Involves taking a copy of the data and storing it in a secondary location.
29
What three types of backups are there?
Full backups Incremental backup Differential backup
30
What is a full backup?
A complete backup of all your data.
31
What is an incremental backup?
A backup of only the data that has changed since the previous backup.
32
What is differential backup?
A mixture of a full backup and an incremental backup.
33
What does physical access controls do?
Prevent unauthorised users from gaining access to our IT systems.
34
What are 4 examples of physical access controls?
Access cards Keypad access control Biometric Electronic locks
35
What are access cards?
Cards that must be scanned to unlock rooms.
36
What are keypad access controls?
A system that requires a passcode to gain entry to a room.
37
What are biometric access controls?
A system that scans biometric data to gain access to a room.
38
What are electronic locks?
To lock and unlock doors electronically when sent signals from the above access controls systems.
39
What are digital certificates?
Used to authenticate a user as the owner of a public key so they can use public key encryption.
40
What is the 2 important contents to a digital certificate?
Digital signature | Public key
41
What is a digital signature?
Verifies the sender identity
42
What is the public key?
Used to encrypt data when sending it to the website.
43
What are protocols?
A set of rules that defines a method for transmitting data between different devices over a network.
44
What are the 2 security protocols?
SSL | TLS
45
What do the security protocols allow us to do?
Send data securely over the internet using encryption.
46
What are the 4 tools used for protecting data?
Antivirus Firewalls Encryption Legislation and Codes of Practices
47
What are 3 common features you see in antivirus software?
Scheduled scans (can be set automatically). Full scans on entire hard disk. Scanning of all fires opened (known as real time protection).
48
What are 3 disadvantages of antivirus software?
Needs to be regularly maintained and updated as new viruses are found. Doesn't offer total protection as new malware programs being written. Can slow down PC/network performance (take up hard disk space, memory, processing power).
49
What are 3 common features of a firewall?
``` Content filtering (used for security/productivity purposes). Controlling which programs can access the LAN/internet. Intruder detection/prevention (identifies/stops hacker from gaining access to network or computer system). ```
50
What is 3 disadvantages of firewalls?
Diminishes performance of the network. Productivity can be impaired (things may be blocked by firewall when needed). Cannot prevent internal attack from within the network.
51
What 2 types of data do we encrypt?
Stored data | Transmitted data
52
What is stored data?
Uses the same key to both encrypt and decrypt the data (symmetric encryption).
53
What is transmitted data?
Uses different keys to encrypt and decrypt the data (asymmetric data).
54
What are 2 implications of stored data?
If you lose the encryption key, you won't ever able to decrypt the data. Sharing of the encryption key can compromise security (key can be intercepted).
55
What is an implication of transmitted data?
If working in large quantities data, the data have a real impact on processing power.
56
What 2 legislation have been implemented to protect data and IT systems from harm?
Data protection act (1998) | Computer misuse act (1990)
57
What is the data protection act (1998)?
Protect how individuals data can be used and handled.
58
What is the computer misuse act (1990)?
Protects against the wilful harm and damage of the IT systems and data.