1.9) Security And Data Management Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Why is network security important?

A

As loss of data; in particular: personal or confidential data may have serious consequences. Risks to data become > as shared across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why are user access levels important?

A

Not desirable that all users have access to all data on a computer system. User access levels 1 method to allow certain users to read + or write access to data on a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why are suitable passwords important?

A

Commonly used to prove a person’s identity to computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an encryption?

A

Conversion of data using an algorithm into a form called cyphertext that cannot be easily understood by people without the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What algorithm does lossless compression use?

A

1 that compresses data into a form that may be decompressed at a later time without any loss of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is archiving the process of?

A

Storing data no longer in current or frequent use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is the process of archiving used?

A

To hold data for security, legal or historical reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the process of archiving data do?

A

It frees up resources on the main computer system allowing faster access to data that is in use.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does cybersecurity refer to?

A

Range of measures that can be taken to protect computer systems, networks + data from unauthorised access or cyberattack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are cyberattacks carried out using?

A

Various types of malware(malicious software).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of malware?

A

Viruses.
Worms.
Spyware.
Trojans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are viruses?

A

Programs that can replicate themselves + spread from 1 system to another by attaching themselves to host files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are viruses used for?

A

Modifying or corrupting information on a targeted computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are worms?

A

Self-replicating programs that identify vulnerabilities in operating systems + enable remote control of infected computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are spyware?

A

Installed by opening attachments or downloading infected software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is spyware used for?

A

Collecting stored data without user’s knowledge.

17
Q

What are trojans?

A

A program that appears to perform a useful function, but also provides a ‘backdoor’ that enables data to be stolen.

18
Q

What are keyloggers?

A

Type of spyware that can be used to track keystrokes + capture passwords, account numbers for fraudulent use.

19
Q

What can keylogger software be used by?

A

Parents to monitor their children’s online activity.

20
Q

What are phishing emails?

A

Emails that ask you to confirm personal details are usually fakes. Should be caught by spam filter.

21
Q

What should you do to protect your computer from phishing emails?

A

Be suspicious + do not provide any sensitive information.

22
Q

What is shoulder surfing?

A

Using direct observation to get information. Relatively simple to stand next to someone + watch as they fill out a form or enter a PIN number, but shoulder surfing can also be carried out long distances with aid of binoculars or even CCTV.

23
Q

What is SQL injection?

A

Technique where malicious users can inject SQL commands into an SQL statement, via web page input. Injected SQL commands can alter SQL statements + compromise security of information held in database.

24
Q

What is DoS attack?

A

Denial of service attacks do not attempt to break system security, attempt to make website + servers unavailable to legitimate users, by swamping system with fake requests- usually in attempt to exhaust server resources.

25
Q

What will a DoS attack involve?

A

Usually a single internet connection. Distributed denial of service attacks launched from multiple connected devices distributed across internet. Multi-person, multi-device attacks target network infrastructure in attempt to saturate it with huge volumes of traffic.

26
Q

What are password based attacks?

A

Dictionary attack: simple file containing words found in dictionary. This attack uses exactly kind of words many people use as their password.
Brute force attack: similar to dictionary attack but able to detect non-dictionary words by working through all possible alphanumeric combinations from aa1 to zzz10. Not quick but will uncover password eventually.
Guess ???: user-generated password unlikely to be random. Passwords likely to be based upon interests, hobbies, pets, family etc. Educated guesses often work.