6 Security, Privacy And Data Integrity Flashcards
Data privacy
The privacy of personal information, or other information stored on a computer, that should not be accessed by unauthorised parties
Data protection laws
Laws which govern how data should be kept private and secure
Data security
Methods taken to prevent unauthorised access to recover data if lost or corrupted
User accounts
An agreement that allows an individual to use a computer to network server often needed a username or password
Authentication
A way proving somebody or something is who/what they claim to be
Access rights
Use of access levels to ensure only authorised users can gain to certain data
Malware
Malicious software to seeks to damage or gain unauthorised access to a computer system
Firewall
Soft wear or hardware that sits between a computer and external network that monitors and filters all incoming and outgoing activites
Anti-spyware software
Soft wear that detects and removes spyware programs installed illegally on a users computer system
Encryption
The use of encryption keys to make data meaningless without the correct decryption key
Biometrics
Use of unique human characteristics to identify a user
Hacking
Illegal access to a computer system without the owners permission
Malicious hacking
Hacking done with the sole intent of cuasing harm to a computer system or user e.g deleting files
Ethical hacking
Hacking used to test the security systems and vulnerabilities of a computer system, and is carried out with the permission of the owner.
Phishing
Legitimate looking emails designed to trick a recipient into giving their personal data to the sender of the email
Pharming
Redirecting a user to a fake website in order to illegally obtain personal data about the user
DNS cache poisoning
Altering IP addressed on a DNS server by a Pharmer or hacker with the intentions of redirecting a user to their fake website
What are the data laws
- Fairly and lawfully processed, 2. Processed for the stated purpose, 3. Adequate, relèvent and not excessive 4. Accurate, 5. Not kept longer then necessary, 6. Processed in line with data subject rights, 7. Kept secure, 8. Not be transferred to another country unless with adequate protection
Characteristics or strong password
A least one capital letter, a least one numerical letter, and at least one special character
Tasks carried out by a firewall
- Examine and monitor traffic between a computer and a public network, 2. Preventing access to certain undesirable sites, 3. Warning the user of a potentially harmful external source, the user is given an option to allow the source
What are the limitations of a firewall
Can prevent user within the internal network from bypassing the modem, cant control employee misconduct and carelessness, cant prevent user on standalone computer buying the firewall
What is antivirus software
A piece of software which constantly monitors for virus attacks
What are the talks carried out by anti virus software
- Checks software of files before they are run or loaded on a computer, 2. Compare possible viruses against a list of already known ones, 3. Checks software for disease related behaviour, 3. Quarantines files or programmes which are possibly infected
Data integrity
The accuracy, completeness and consistency of data
Validation
Method used to ensure entered data is reasonable and meets a certain input criteria
Verification
Method used to ensure data is correct by using double entry or visual checks
Check digit
Additional digit appended to a number to check if entered data is error free
Modulo - 11
Method used to calculate a check digit based on Modulus divison by 11
Checksum
Verification method used to check if data transferred has been altered or corrupted, calculated form the block of data to be sent
Parity check
Method used to check if data has been transferred correctly that uses even or odd parity
Parity bit
An extra bit found at the end of a byte that is set to 1if needed to agree with a parity protocol
Odd parity
Binary number with an odd amount of 1 bits
Even parity
Binary number with an even amount of 1 bits
Parity block
Horizontal and verticale parity check on a block being transferred