2.8 Data Security Flashcards
What are the key risks to files for most companies with an online presence?
Outside access and manipulation of files.
Unauthorised reading or copying of files.
Corruption of files.
Loss or deliberate deleting of files.
What protection can be applied to files?
Levels of permitted access.
Passwords for access.
Write-protect mechanisms.
What is Cryptography?
The act of scrambling a piece of plain text into cipher text so that it can’t be immediately understood. (Practically known as encryption)
What is a Caesar Cypher?
The simplest and most well known form of encryption where each letter in the alphabet is shifted a certain number of places.
What is Symmetric Encryption?
Where the process of decryption is the opposite process used to encrypt. These algorithms have one key which is needed at both ends of a transmission.
What is an advantage and disadvantage of Symmetric Encryption?
Symmetric is best used for data on your own disks as its fast however, they are very easy for modern computers to crack.
What is Asymmetric Encryption?
Algorithms which have two keys - a private and a public key. If someone knows the encryption key, they can encrypt information but they can’t decrypt it.
What is an advantage and disadvantage of Asymmetric Encryption?
A shared secret key doesn’t have to be exchanged over an insecure medium such as the internet however, asymmetric keys are far slower to use and are not feasible for use in transmitting large amounts of data.
What is a biometric device?
A device which adds security to a computer system which works with unique features of the human body.
What are 5 examples of biometric security?
Fingerprint Recognition.
Iris Scanning.
Retina Scanning.
Facial Recognition.
Voiceprint Recognition.
What are the key stages of deploying biometric security?
Captured.
Digitised.
Stored.
Compared.
What are some examples of Facial Recognition being used?
Used by the police at football grounds to check for known trouble-makers.
City centre drunkenness patrols.
Shopping centre CCTV.
Airport Security.
What are 4 examples of issues associated with the use of biometrics?
If innocent people’s faces are stored by the police that could cause privacy issues.
Physical/Eye damage from repeated flash photography.
Concerns around the use of personal data.
Criminals could gain access if original data capture was flawed.
What 3 situations could prevent Voiceprint Recognition from working?
High background noise.
Cold/Sore Throat.
Recording and playing back of the original voice to gain unauthorised access.
What are 3 advantages of the use of biometrics?
Biometrics are unique to a person.
Very difficult to copy, steal or imitate.
It is not possible to forget as you don’t have to remember a card or PIN.