9. Security and data management Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is a backup?

A

A copy of data that can be used if the original is lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the difference between incremental and full backups?

A

Incremental backups make a copy of new files or any files that have been modified since the last back up, whereas full backups make a copy of every single file on a computer system. Incremental backups are quicker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why do backups need to be done regularly?

A

The older the backup becomes, the less likely it is to match the current data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the grandfather-father-son method of backing up files?

A

3 backup copies are kept, with the oldest being the grandfather, the second oldest being the father and the newest being the son. The grandfather backup eventually gets updated with the newest backup of the data, and so becomes the son. The Previous son becomes the father and the previous father becomes the grandfather.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When would a backup need to be recovered?

A
  • hardware failure
  • human error
  • software failure
  • viruses
  • hacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is archiving?

A

The process of storing data that is no longer in current or frequent use. Archived data is stored on an appropriate storage medium, such as magnetic tape or a DVD.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is archiving needed?

A

It allows for currently redundant data that could be useful in the future to be kept and stored, whilst also freeing up space on a computer system and allowing it to access data that is currently in use faster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cybersecurity?

A

The methods of use that can be used to protect computer systems, networks or data from cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is malware?

A

Malware is a type of harmful program that seeks to damage or gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a virus?

A

A program that replicates itself and can spread from one system to another by attaching themselves to host files. They are used to modify or corrupt data on a targeted computer system. They can only be activated when a user interacts with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a worm?

A

Self-replicating programs that identify weaknesses in operating systems and gain remote control over the infected computer system. They do not need to be interacted with in order to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is spyware?

A

Used to collect data without the user’s knowledge. They can be installed by opening attachments or downloading infected software. This data is then sent back to the attacker without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are keyloggers?

A

A type of spyware that tracks keystrokes. This can be used to obtain passwords and account numbers for fraudulent use. They can also be used by parents to monitor their children’s online activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a trojan?

A

A program that appears to be useful, but also provides a ‘backdoor’ which allows data to be stolen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you protect against malware?

A
  • use a firewall
  • keep operating systems up to date
  • use the latest version of web browsers
  • look out for phishing emails
  • install anti virus software
    If you suspect malware is on your computer system, run a malicious software removal tool.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does antivirus software work?

A

It monitors activity on your computer and checks for viruses. Each virus has a signature, which is known to antivirus software and helps them detect viruses. Antivirus software needs to be updated frequently to keep up with the new viruses that are created daily.

17
Q

How do firewalls work?

A

They control incoming and outgoing network traffic by analysing data packets and deciding whether they should go through or not. This decision is based on a pre-defined set of rules.

18
Q

Why is it important to keep your operating system and web browsers up to date?

A

New ways of bypassing security are often discovered, and manufacturers are always trying to remove security vulnerabilities. Keeping these updated ensures you have the latest patch and minimal chances of your computer system becoming infected with malware.

19
Q

What is shoulder surfing?

A

When a person physically observes someone’s actions to obtain their sensitive data. This could be whilst they are filling out a form or entering a PIN number.

20
Q

What is an SQL injection?

A

A malicious SQL (a programming language used to manipulate data in a database) command is entered into a data input box on a website. If the website is insecure, then this will give the attacker unauthorised access to the website’s database.

21
Q

What is a DoS attack?

A

They attempt to slow a system or make websites temporarily unavailable by flooding them with requests and generating a huge amount of traffic. A DDoS attack is when this is done from multiple devices, so can therefore send even more requests.

22
Q

What are some password-based attacks?

A
  • brute force: every single combination is tried until the password is obtained
  • dictionary: words from a dictionary that would be typically used in a password
  • guess: passwords can sometimes be obtained via an educated guess
23
Q

What is IP address spoofing?

A

When an IP address of a legitimate website is modified so that when a user enters the URL, they are taken to a fraudulent website as well. These are then used to steal data or install malware.

24
Q

What is social engineering?

A

When the attacker attempts to trick the user into giving out sensitive information. This could be done by posing as a legitimate system administrator to gain the user’s trust.

25
Q

What is footprinting?

A

Gathering all information from a computer system or network to see how much detail a potential attacker could find out. This allows organisations to then limit the amount of data that is publicly available.

26
Q

What does an ethical hacker do?

A

They attempt to bypass system security and identify any weak points that could be utilised by malicious hackers. They are given permission by the system owner to do this so that the owner can improve security.