3.1 POTENTIAL RISKS TO DATA AND PERSONAL INFORMATION WHEN INFORMATION IS TRANSMITTED AND STORED DIGITALLY Flashcards
WHAT IS DELIBERATE DAMAGE BY MALWARE?
Malware can show messages, play sounds, delete files, re-progam systems to perform tasks that will harm the system and connected hardware.
WHAT IS ACCIDENTAL DELETION?
Delete files/entire content in a drive by mistake. Can be done by:
Pressing a key accidentally
Formatting media on wrong storage media device
Unexpectedly lose power
WHAT ARE METHODS OF STEALING PERSONAL INFORMATION?
- Phishing
- Pharming
WHAT IS PHISHING?
Sending large numbers of messages via SMS/Instant messaging apps that appear to form real organisations. These emails ask for credentials (bank details).
WHAT IS SPEARPHISING?
Spearphishing is phishing but customised to a certain number of users
WHAT IS PHARMING?
Creating fake versions of trusted websites to trick users into entering their credentials - made identical to real website.
WAYS OF PHARMING?
- Internet trafficking - redirecting from real websites to fake. Uses malware. Altering domain name servers
- misspelling URL
WHAT ARE THE METHODS OF SECURING DATA ONLINE?
- Firewall
- Encryption
- Passwords, PINs, Biometrics
- Capcha tests
- Anti-malware
- Access rights and file permissions
- Secure websites
- Email attachments
- Backup procedures
- Third party payment systems
- Bank cards
- Contactless payments using NFC
WHAT DO FIREWALLS DO?
Controls data in and out of a network. Examine network addresses and ports of data. Compares details to a list of rules set by network administrators. Determines what traffic is allowed to travel in and out of network.
HOW DOES ENCRYPTION WORK?
Uses a key to scramble data into an unreadable format.
WHY ARE PASSWORDS, PINs, BIOMETRICS USED?
Used to authenticate a user to access an online system.
EXAMPLE OF PASSWORD REQUIREMENTS?
Has to be 8 characters, mix of letters, symbols, upper and lower case, random characters, changed frequently.
WHAT DO CAPCHA TESTS DO?
Makes sure data is entered by human not by a bot. Recapcha is used to help digitalise books and annotate images.
WHAT ARE THE TYPES OF ANTI MALWARE?
- Anti-virus
- Anti-adware
- Anty-spyware
WHAT IS AN ANTI-VIRUS?
Checks files that are downloaded for signs of viruses. Has a list of viruses, matches it to actual virus if found. Then quarantines file.
WHAT IS AN ANTI-ADWARE?
Detects, quarantines and removes adware.
WHAT IS AN ANTI-SPYWARE?
Detects, quarantines and removes spyware.
WHAT IS SPYWARE?
EG - keylogger
Spyware monitors and records computer data.
WHY ARE ACCESS RIGHTS AND FILE PERMISSIONS USED?
Permissions are set for access to files, folders, drives allowing users to read only/ read and write to the file.
WHAT ARE THE DIFFERENT BACKUP PROCEDURES?
- Full backup
- Incremental backup
- Differential backup
WHAT IS FULL BACKUP?
Complete copy
WHAT IS INCREMENTAL BACKUP?
Contains files which have been altered since last backup
WHAT IS DIFFERENTIAL BACKUP?
Saves only difference in data since last full backup.
HOW ARE BACKUPS STORED?
They are usually stored on external device because it is more secure. Can be stored online (copy of data is stored in two different geographical locations) - slower as it requires internet.
HOW ARE THIRD PARTY PAYMENTS USED?
EG - Paypall/Skrill
Allows users to create accounts so they can send a receive money - uses email accounts for identification.
WHAT DO BANK CARDS DO?
Allow payments online. Pay by entering card number, expiry date, name on card, card security code.
HOW ARE CONTACTLESS PAYMENTS USING NFC USED?
Used in payment cards to allow transfer of payment data. Payment data requires PIN or any form of user authentication. If card reader is in range and is requesting payment, then contactless card will take payment to a maximum amount.