9. Privacy and security Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is data privacy?

A

Data privacy is about keeping data private rather than allowing it to be available in the public domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Data integrity?

A

Data integrity is the assurance that digital information is uncorrupted and can only be accessed or modified by those authorized to do so.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware and what types of them are there?

A

Malware is the everyday name for malicious software. It is software that is introduced into a system for a harmful purpose.
Various types of malware-containing program codes are:
• virus: tries to replicate itself inside other executable code
• worm: runs independently and transfers itself to other network hosts
• logic bomb: stays inactive until some condition is met
• Trojan horse: replaces all or part of a previously useful program
• spyware: collects information and transmits it to another system
• bot: takes control of another computer and uses it to launch attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware and what types of them are there?

A

Malware is the everyday name for malicious software. It is software that is introduced into a system for a harmful purpose.
Various types of malware-containing program codes are:
• virus: tries to replicate itself inside other executable code
• worm: runs independently and transfers itself to other network hosts
• logic bomb: stays inactive until some condition is met
• Trojan horse: replaces all or part of a previously useful program
• spyware: collects information and transmits it to another system
bot: takes control of another computer and uses it to launch attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Classify malware in terms of the activity involved.

A

• phishing: sending an email or electronic message from an apparently legitimate source requesting confidential information
• pharming: setting up a bogus website which appears to be a legitimate site
• keylogger: recording keyboard usage by the legitimate user of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give examples of security measures for protecting computer systems

A

• Ideally a firewall will be a hardware device that acts like a security gate at an international airport. Nothing is allowed through without it being inspected.
• Digital signature
• Possibly special-purpose anti-spyware software might be installed. Another option is to install an intrusion detection system that will take as input an audit record of system use and look for examples that do not match expected system activity or install what is normally referred to as anti-virus software but which is usually aimed at combating any type of malware.
• The main security feature of a user account is the authentication of the user. The normal method is to associate a password with each account.
• The solution is to have an authorization policy which gives different access rights to different files for different individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Data validation?

A

Data validation is the practice of checking that the data is in the right format, not out of range, the right type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Data verification?

A

Data verification is the means of getting the user to confirm that the data entered was what was intended

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give one example of data verification

A

One-bit parity check - the first digit of 8 bit code is either 1 or 0 depending whether it is odd or even.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of data validation?

A

• a presence check to ensure that an entry field is not left blank
• a format check, for example a date has to be dd/mm/yyyy
• a length check, for example with a telephone number
• a range check, for example the month in a date must not exceed 12
• a limit check, for example a maximum number of years for a person’s age
• a type check, for example only a numeric value for the month in a date
• an existence check, for example that a file exists with the filename referred to in the data entry.
• a check digit - ….

How well did you know this?
1
Not at all
2
3
4
5
Perfectly