1.4.1 Keeping Data Safe Flashcards
1
Q
State the 3 types of threat to keeping data safe
A
-
Accidental Damage or Loss
- Unintended corruption, deletion or damage to data that is usually caused by human error
-
Natural disaster
- For example: floods, fires, hurricanes, tsunamis
-
Malicious Actions
- Deliberate unauthorised actions intended to cause damage by viewing, deleting, copying or corrupting data
2
Q
State 5 types of accidental damage
A
- Human error - Data entry errors, accidental deletion, lose device…
- Physical damage – Drop device and damage hard drive
- Power failure/surge - electrical components damaged
- Hardware failure - Hard disk crash
- Software crashing – application crashes in middle of an operation and data lost
3
Q
Give 3 examples of malicious actions on data
A
- Hacking - unauthorised access leading to loss or damage
- Malware – Malicious Software designed to corrupt or prevent access to data
- Theft - Stealing data from devices or Data files that are are left unsecured
4
Q
Give 3 examples of physical security
A
- Issuing all staff with ID badges
- Having all visitors to a building sign in on arrival
- Having all visitors be escorted around the building
- Keeping sensitive areas locked
- Security guards
- Biometric security e.g. fingerprint
5
Q
State 5 ways we can reduce risk to data?
A
- Setting suitable access rights/user permissions
- Encrypting data so that only authorized parties can understand the information
- Password protecting individual files
- Running regular backups, to another device or the cloud
- Monitoring of staff computer activity
- Install anti-virus/anti-malware/anti-hacking software
- Keep all software, including operating systems, up-to-date
- Use strong passwords and vary these for different websites
- Make sure you are protected by a firewall
- Verification can be used to get confirmation from a user e.g. deleting a file
6
Q
What are backups?
A
Data is backed up regularly so that data lost or corrupted can be restored
7
Q
What is archiving?
A
The storage of data that is no longer needed for immediate processing, but needs to be kept
8
Q
How can we make our passwords secure?
A
- Length: Use a minimum number of characters
- Use a mixture of numbers, lowercase and uppercase characters
- Include special characters such as &, !, #, %
- Do not include your name, DOB or personal details
9
Q
What is an audit trail/log?
A
- An audit trail maintains a record of all activity that has taken place on a computer system
- Every time a user accesses the system, the time and date are logged along with their actions
- It can assist in detecting security violations