Week 6 Flashcards

1
Q

What is Hashing?

A

Hashing used either to hide the original contents of a

message or to check the integrity of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List 2 Characteristics of Hashing

A
  • Must be difficult to retrieve the original text from the hash value
  • Must be hard to find two different inputs of any length that result in the same hash
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List 3 Popular hash functions

A

1 MD
2 SHA
3 RIPEMD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Name 3 uses of hashes

A

1) Securely store passwords
2) Generate signature for files, used to check if they have been changed
3) Used to identify that a file/certificate has not been changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name 3 Issues with Hashing

A

1 Collision
2 Similar context
3 Full context

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Whats the Computer Misuse Act 1990?

A

Criminalises unauthorised access to computer material

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Whats the The Fraud Act 2006 ?

A

The Fraud Act defines fraud in three ways: False representation, Failing to disclose information, Abusing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Whats the The Investigatory Powers Act 2016?

A

Governs use of surveillance by public bodies such as police and intelligence services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Firewall?

A

A barrier that blocks dangerous communication from spreading across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a VPN?

A

A means of creating a private network across an untrusted network such as the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is GDPR?

A

A regulation by which the European Government have strengthened and unified data protection for EU residents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name 3 areas of concern relating to GDPR laws?

A
  • Marketing
  • Legal
  • IT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are checksums used or in cryptography?

A

Provide privacy, prove identity and show integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly