1.9) Security And Data Management Flashcards
Why is network security important?
As loss of data; in particular: personal or confidential data may have serious consequences. Risks to data become > as shared across a network.
Why are user access levels important?
Not desirable that all users have access to all data on a computer system. User access levels 1 method to allow certain users to read + or write access to data on a computer system.
Why are suitable passwords important?
Commonly used to prove a person’s identity to computer system.
What is an encryption?
Conversion of data using an algorithm into a form called cyphertext that cannot be easily understood by people without the decryption key.
What algorithm does lossless compression use?
1 that compresses data into a form that may be decompressed at a later time without any loss of data.
What is archiving the process of?
Storing data no longer in current or frequent use.
Why is the process of archiving used?
To hold data for security, legal or historical reasons.
What does the process of archiving data do?
It frees up resources on the main computer system allowing faster access to data that is in use.
What does cybersecurity refer to?
Range of measures that can be taken to protect computer systems, networks + data from unauthorised access or cyberattack.
What are cyberattacks carried out using?
Various types of malware(malicious software).
What are examples of malware?
Viruses.
Worms.
Spyware.
Trojans.
What are viruses?
Programs that can replicate themselves + spread from 1 system to another by attaching themselves to host files.
What are viruses used for?
Modifying or corrupting information on a targeted computer system.
What are worms?
Self-replicating programs that identify vulnerabilities in operating systems + enable remote control of infected computer.
What are spyware?
Installed by opening attachments or downloading infected software.
What is spyware used for?
Collecting stored data without user’s knowledge.
What are trojans?
A program that appears to perform a useful function, but also provides a ‘backdoor’ that enables data to be stolen.
What are keyloggers?
Type of spyware that can be used to track keystrokes + capture passwords, account numbers for fraudulent use.
What can keylogger software be used by?
Parents to monitor their children’s online activity.
What are phishing emails?
Emails that ask you to confirm personal details are usually fakes. Should be caught by spam filter.
What should you do to protect your computer from phishing emails?
Be suspicious + do not provide any sensitive information.
What is shoulder surfing?
Using direct observation to get information. Relatively simple to stand next to someone + watch as they fill out a form or enter a PIN number, but shoulder surfing can also be carried out long distances with aid of binoculars or even CCTV.
What is SQL injection?
Technique where malicious users can inject SQL commands into an SQL statement, via web page input. Injected SQL commands can alter SQL statements + compromise security of information held in database.
What is DoS attack?
Denial of service attacks do not attempt to break system security, attempt to make website + servers unavailable to legitimate users, by swamping system with fake requests- usually in attempt to exhaust server resources.
What will a DoS attack involve?
Usually a single internet connection. Distributed denial of service attacks launched from multiple connected devices distributed across internet. Multi-person, multi-device attacks target network infrastructure in attempt to saturate it with huge volumes of traffic.
What are password based attacks?
Dictionary attack: simple file containing words found in dictionary. This attack uses exactly kind of words many people use as their password.
Brute force attack: similar to dictionary attack but able to detect non-dictionary words by working through all possible alphanumeric combinations from aa1 to zzz10. Not quick but will uncover password eventually.
Guess ???: user-generated password unlikely to be random. Passwords likely to be based upon interests, hobbies, pets, family etc. Educated guesses often work.