6.4 - 6.6 - Protection measures, physical and logical protection Flashcards

1
Q

Placing computers above known flood levels

A

For example, on the top floors of buildings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access rights to information

A

Which staff can access which files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Policy

A

A set of ideas or a plan of what to do in particular situations that has been agreed to officially by a group of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Responsibilities of staff for security of information

A

Individual staff maintaining security for data in their area, allows for more focused security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disaster recovery

A

A documented procedure that should be followed to recover and protect the IT infrastructure in an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Information security risk assessment

A

Used to identify, estimate and prioritise risks to organisations resulting from the operation and use of information systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Evaluation of effectiveness of protection measures

A

Process of reviewing the measures in place to ensure they are fit for purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Training of staff to handle information

A

For example, not divulging information to unauthorised people, logging out of systems when not in use, preventing unauthorised people from seeing the computer screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Biometrics

A

The identification of a user based on a physical characteristic, such as a fingerprint, iris, face or voice.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Firewall

A

A form of network security that monitors traffic into and out of a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Locks, keypads and biometrics

A

Access to doors, workstations server rooms can be physically stopped by locking screens via the keypad or putting padlocks on machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Physical protection

A

Refers to the protection of locations and equipment from theft, vandalism, natural disasters , man-made catastrophes and accidental damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Back up systems in other locations

A

Storing back ups alternative areas to where the information is normally used - different sites, cloud storage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security staff

A

Monitor buildings and prevent unauthorised access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Shredding paper based records

A

These are almost impossible to rebuild therefore information that was stored on them will be unable to be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Logical protection

A

Uses digital/software-based methods to protect data.

17
Q

Tiered levels of access to data

A

The process of making certain information only accessible to certain staff.

18
Q

Anti-malware applications

A

Any software that protects a computer from malware eg anti-virus, spyware, pop up blockers.

19
Q

Obfuscation

A

Purposely making something unintelligible so that it can’t be understood.

20
Q

Data at rest

A

Data that is being stored on digital media while it is not being transferred between devices.

21
Q

Data in transit

A

Data that is moving from one location to another eg across the internet or a network.

22
Q

Encryption

A

Converting data from a readable format to an encoded version.

23
Q

Decryption

A

A process that reverses encryption, taking a secret message and reproducing the original plain text