3.1 POTENTIAL RISKS TO DATA AND PERSONAL INFORMATION WHEN INFORMATION IS TRANSMITTED AND STORED DIGITALLY Flashcards

1
Q

WHAT IS DELIBERATE DAMAGE BY MALWARE?

A

Malware can show messages, play sounds, delete files, re-progam systems to perform tasks that will harm the system and connected hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT IS ACCIDENTAL DELETION?

A

Delete files/entire content in a drive by mistake. Can be done by:
Pressing a key accidentally
Formatting media on wrong storage media device
Unexpectedly lose power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

WHAT ARE METHODS OF STEALING PERSONAL INFORMATION?

A
  1. Phishing
  2. Pharming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

WHAT IS PHISHING?

A

Sending large numbers of messages via SMS/Instant messaging apps that appear to form real organisations. These emails ask for credentials (bank details).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WHAT IS SPEARPHISING?

A

Spearphishing is phishing but customised to a certain number of users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WHAT IS PHARMING?

A

Creating fake versions of trusted websites to trick users into entering their credentials - made identical to real website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WAYS OF PHARMING?

A
  • Internet trafficking - redirecting from real websites to fake. Uses malware. Altering domain name servers
  • misspelling URL
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WHAT ARE THE METHODS OF SECURING DATA ONLINE?

A
  1. Firewall
  2. Encryption
  3. Passwords, PINs, Biometrics
  4. Capcha tests
  5. Anti-malware
  6. Access rights and file permissions
  7. Secure websites
  8. Email attachments
  9. Backup procedures
  10. Third party payment systems
  11. Bank cards
  12. Contactless payments using NFC
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

WHAT DO FIREWALLS DO?

A

Controls data in and out of a network. Examine network addresses and ports of data. Compares details to a list of rules set by network administrators. Determines what traffic is allowed to travel in and out of network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

HOW DOES ENCRYPTION WORK?

A

Uses a key to scramble data into an unreadable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHY ARE PASSWORDS, PINs, BIOMETRICS USED?

A

Used to authenticate a user to access an online system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

EXAMPLE OF PASSWORD REQUIREMENTS?

A

Has to be 8 characters, mix of letters, symbols, upper and lower case, random characters, changed frequently.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT DO CAPCHA TESTS DO?

A

Makes sure data is entered by human not by a bot. Recapcha is used to help digitalise books and annotate images.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT ARE THE TYPES OF ANTI MALWARE?

A
  1. Anti-virus
  2. Anti-adware
  3. Anty-spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT IS AN ANTI-VIRUS?

A

Checks files that are downloaded for signs of viruses. Has a list of viruses, matches it to actual virus if found. Then quarantines file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

WHAT IS AN ANTI-ADWARE?

A

Detects, quarantines and removes adware.

17
Q

WHAT IS AN ANTI-SPYWARE?

A

Detects, quarantines and removes spyware.

18
Q

WHAT IS SPYWARE?

EG - keylogger

A

Spyware monitors and records computer data.

19
Q

WHY ARE ACCESS RIGHTS AND FILE PERMISSIONS USED?

A

Permissions are set for access to files, folders, drives allowing users to read only/ read and write to the file.

20
Q

WHAT ARE THE DIFFERENT BACKUP PROCEDURES?

A
  1. Full backup
  2. Incremental backup
  3. Differential backup
21
Q

WHAT IS FULL BACKUP?

A

Complete copy

22
Q

WHAT IS INCREMENTAL BACKUP?

A

Contains files which have been altered since last backup

23
Q

WHAT IS DIFFERENTIAL BACKUP?

A

Saves only difference in data since last full backup.

24
Q

HOW ARE BACKUPS STORED?

A

They are usually stored on external device because it is more secure. Can be stored online (copy of data is stored in two different geographical locations) - slower as it requires internet.

25
Q

HOW ARE THIRD PARTY PAYMENTS USED?

EG - Paypall/Skrill

A

Allows users to create accounts so they can send a receive money - uses email accounts for identification.

26
Q

WHAT DO BANK CARDS DO?

A

Allow payments online. Pay by entering card number, expiry date, name on card, card security code.

27
Q

HOW ARE CONTACTLESS PAYMENTS USING NFC USED?

A

Used in payment cards to allow transfer of payment data. Payment data requires PIN or any form of user authentication. If card reader is in range and is requesting payment, then contactless card will take payment to a maximum amount.