2.4 Securing Data & Systems Flashcards

1
Q

Document Creation Software

A

Used for letter writing like word

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Collaboration of Documents

A

Allow users to work together on documents by discussing changes on the screen all the time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Support Workflow

A

Allows managers to set tasks for individuals with completion times and can track which tasks have been completed within a wider project

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electronic Signatures

A

Simply as it states including scanned signatures and tick boxes with statements
Enhanced electronic signatures are uniquely linked to the signatory and the signature is created with a private key which is only available to the signatory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sharing Documents via Email

A

Documents can simply be sent as email attachments rather than sending them by conventional mail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Enterprise Content Management

A

System designed to manage an organisation’s documents. Unstructured information - including word processing documents, spreadsheets, PDF documents and scanned images

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Digital Systems to manage stock

A

1) product is scanned
2) price is displayed on the screen
3) deduct one form the stock level
4) re-stock level reached
5) automatically reorder of stock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Managements Information System

A

This system is a collection of hardware and software acting as the backbone of an organisations operations. MIS collects data from multiple online systems, analyses the information reports on data to help make management decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Smart Devices

A

Smart light bulbs, smart thermostat, smart doorbell & smart locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Home Streaming

A

Video streaming - Amazon & audio streaming like Spotify

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pilot Method

A

A small scale implementation of a digital system perhaps in one part of the office with a set of users, one department or one branch, main benefit of pilot method is risk reduced
- Advantages:
All features of the new system can be used fully & staff from the pilot can help train other staff
- Disadvantage:
Slower than other methods & no back up system for the department taking part if anything goes wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Parallel Method

A

Introducing the new system and it runs alongside the old system at the same time but people can revert back to old system if needed
- Advantage:
If a problem arises, users can return to use the old system & new system is available immediately
- Disadvantage
Having two systems can cause confusion & it’s expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Big Bang

A

Digital system implementation is where a company starts using the new system immediately
- Advantages
Cost effective and has shorter implementation time
- Disadvantage
Full testing is difficult before implementation & no fall back system if the new system has problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Passive Digital Footprint

A

Data collected without the users knowledge, a data trail unintentionally left online so people can see your IP address and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Active Digital Footprint

A

Data intentionally submitted online like posting on social media, sharing locations on apps and agreeing to install or accept cookies when browsing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Employers monitoring their Employees

A
  • monitoring online access and what they post on social media
  • see if they have written anything inappropriate or rude
  • access to their search history
  • see what potential employees do
  • also see number of hours someone works
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Changing Working Practices

A
  • increased amount of new jobs such as social media manager, computer game programmer and cyber text analysis
  • job losses due to technology such as cashier jobs and travel agents
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Collaborative Working

A

You can work at the same time online remotely on the same document as other members of staff like Google meets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Teleworking

A

Working online, you can use VOIP (voice over internet protocol) to make voice calls over the internet (rather than a telephone company’s wiring)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Video Conference

A

Skype/Zoom/Google Meets (remember online lessons) lets you see and speak to everyone at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Digital Divide

A

The gap between those who have broadband and those who don’t

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Those with Broadband

A
  • educated
  • urban
  • rich
  • higher speed phones/computers
  • higher speed connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Those without Broadband

A
  • uneducated
  • rural
  • poor
  • lower speed on phones/computer
  • lower speed connections
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Retraining and Upskilling

A

The best people are those with an understanding of the traditional roles being replaced by technology, in such a scenario, retraining and upskilling can offer new roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

B2B (business to business)

A

Businesses exchange products, services and information with another business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

EDI (electronic data interchange)

A

The paperless electronic interchange of business documents between companies in a standard format

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Advantages of B2B & EDI

A
  • orders processed quicker
  • staff are released to undertake higher value tasks like customer service
  • costs are reduced due to spending less time filming/searching
  • using less paper is better for environment
28
Q

B2C (business to customer)

A

Business selling services and products to consumers

29
Q

C2C

A

Consumer to consumer

30
Q

Online Marketing

A

Platform business use to sell, rather than creating your own website, a number of companies offer use of their sales platform to sell products - Etsy or Amazon

31
Q

Advantages of Online Marketing

A
  • creating shop is a quick process
  • no need to pay for design or website costs
  • reduces market cost
  • no need to install or maintain payment methods
32
Q

Disadvantage of Online Marketing

A
  • bad/fakers views cause an impact
  • company does not have much control over website design/branding
  • subscription costs can be high £1000+ per month
33
Q

Online Shopping Advantages & Disadvantages to customer

A
  • can purchase products 24/7
  • you can track package
  • save travel and transport costs
  • don’t know quality of what your buying
  • customers receive spam emails after creating account
  • shopping experience lost
34
Q

Online Shopping Advantages & Disadvantages to business

A
  • sell goods 24/7
  • customers from all around the world
  • don’t need to pay for physical shops
  • keeping bank details secure
  • bad/fake reviews affect sales
  • issues with delivering goods
35
Q

Blanket Emails

A

Sent to all the customers on the database

36
Q

Targeted Emails

A

Promoting specific products that have been targeting using mining methods and new customers are buying + using emails lists

37
Q

Social Media Marketing

A

Posting on social media promotes a product or service

38
Q

Influencer Marketing

A

Giving a positive opinion on a product

39
Q

Data Mining

A

Companies analyse the data they hold about customers, to target people the correct ads and products to predict trends

40
Q

Search Engine Optimisation

A

When customers search for a product, companies want their products to be one of the first results and achieved through website design

41
Q

Accidental Damage

A

When you accidentally delete a file or overwriting of a file, leaving a laptop on a train would lead to loss of hardware and potentially loss of data

42
Q

Malicious and Deliberate Damage

A

A disruptive employee deleting data on purpose

43
Q

Viruses

A

Programs that can replicate themselves and spread from one system to another by attaching to a host file - used to alter or pollute information on a targeted computer system
Worms are self replicating programs and can remotely infect the device

44
Q

Malware

A

Short for malicious software, malware is term used to describe software used t disrupt computer operation. Viruses, worms, key-logger and trojans all count

45
Q

Phishing

A

Deception by using a kind of social engineering where a network user is deceived to reveal personal or secret information

46
Q

Social Engineering

A

Psychological manipulation of people into revealing personal or confidential information. One common method is to use social media to get people to reveal their personal details

47
Q

Brute Force Attacks

A

Attempting a combination of usernames and passwords repeatedly to gain access to a computer system

48
Q

Denial of Service Attacks (DoS)

A

Prevention of access to system by regularly sending huge amounts of messages, usually emails, asking a network or server to authenticate a request that has no valid return address. This can be from one computer or a network of computers, with or without the user’s knowledge

49
Q

Data Interception/Hacking

A

Once a hacker has accessed a system using any or all of the methods above, they can operate in several ways
- preventing access and claiming a ransom to provide access to the computer system
- data theft (stealing data from user)

50
Q

Security Measures

A

Such as encryption and encoding data either symmetrically (weak) or asymmetrically (strong) in order to prevent access to information

51
Q

Symmetric Encryption

A

Key for encryption and decryption is the same (Caesar’s cypher), simple and fast but is weak as it’s possible to figure out the pattern

52
Q

Asymmetric Encryption

A

Everyone has a public key so if you send an encrypted message you use the public key. A secure system because you don’t need to send the key - more complicated = slower to decrypt

53
Q

Firewalls

A

A network security system that monitors incoming and outgoing traffic based on predetermined rules

54
Q

Anti-virus Software

A

A program that can be loaded into the memory when the computer is running. It monitors activity on a computer system, looking for signs of virus infection

55
Q

Hierarchical Access Levels

A

Assigning different levels of system access to users depending on their role. User access levels are one method used to grant certain users access and/or write access to data on a computer system

56
Q

Cyber Resilience

A

A company’s ability to prepare, survive, respond to and recover from a cyber attack
- Consequences
• permanent of temporary loss of data and information
• damaged or corrupt software
• websites going offline with need of repair
• loss of reputation that has been built
• loss of comparative advantage
• financial loss

57
Q

Boundary Firewall & Internet Gateway

A

Firewall helps to block external threats or attacks from accessing the system in the first place, monitoring all network traffic and can identify and block unwanted traffic that could damage your computer, system and networks

58
Q

Secure System Configuration

A

Admin accounts, adult trails, account management and backups

59
Q

Restricted Access to Valuable Data

A

Only limited number of staffs with high bevel access will be able to edit, delete, add or access data

60
Q

Malware Protection

A

Ensuring that there is a robust firewall with antivirus programs installed on every machine which is regularly updated, web filters can be installed to block inappropriate websites and intrusion detection systems, informing staff of an issue

61
Q

Patch Management

A

Companies will publish a patch to ensure the latest updates are applied to all machines

62
Q

Ensuring known Vulnerabilities are Dealt with

A

Technical staff need to keep the system updated and install updates as they are published

63
Q

Implementing Staff Training

A

To ensure staff are not putting data at risk so they are fully informed

64
Q

Good Disaster Plan

A
  • exploring what if situations?
  • regular backups
  • having arrangements for use of alternative premises, communication methods and facilities
65
Q

GDPR

A

Personal data must be
- processed lawfully and fairly
- collected for specified, explicit and legitimate purposes
- adequate, relevant and limited to what is necessary for purposes for which it is processed
- accurate and kept up to date
- kept for no longer than necessary
- held securely; protected against unlawful processing, loss, destruction

66
Q

Computer Misuse Act 1990

A
  • access data without permission and looking at someone else’s files
  • access computer systems without permission like hacking
  • alter data stored on a computer system without permission like writing a virus with erases data intentionally
67
Q

Investigatory Power Act 2016

A

Prevent or detect crime, prevent public disorder, ensure national security and public safety, investigate or detect any abnormal or unlawful use of telecommunication systems