9. Security and Data management Flashcards

1
Q

Methods of identifying vulnerabilities (3)

A

🔎footprinting
🔎ethical hacking
🔎penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Footprinting definition and purpose

A

Gathering all available information about the network/system
Enables a tester to see how much information a hacker could find and allows company to remove it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ethical hacking definition

A

Hacking carried out with systems permission (to search for weak points)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Penetration testing definition

A

A subset of ethical hacking
Testing system to find vulnerabilities done by software or manually

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Penetration testing types

A

Targeted testing
External testing
Internal testing
Blind testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Targeted testing definition (done by who)

A

Done by IT and pen testing team together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

External testing definition/purpose

A

See how far in an attacker can get

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Blind testing definition/purpose

A

Limit information available to tester to simulate a real hacker’s actions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Different forms of attack based on technical weakness (3)

A

DoS attack, password attack, IP address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Different forms of attack based on user behaviour (2)

A

Social engineering, phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DoS attack definition

A

Computer system becomes unavailable to intended users. Sometimes caused by bombarding System with emails/requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Brute force password attack definition

A

Hacking algorithm tries all combinations until one fits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Dictionary password attack definition

A

Systematically trying every word in dictionary until it finds a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IP address spoofing definition

A

A false IP address is put into a data packet to hide the senders real identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Social engineering definition

A

Manipulation of someone to divulge confidential information e.g. password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing definition

A

Attempting to gain confidential/personal information by pretending to be an official site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Malicious software/malware definition

A

Any software that could be used to disrupt a computer’ operation/compromise a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Virus definition

A

Computer programs that copy themselves onto other programs, often with malicious intent (e.g. damage data, fill the hard drive, shut down the computer unexpectedly)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Worm definition

A

Like viruses but replicate in order to spread to other computers in a network

20
Q

Key loggers definition

A

Capture user’s keystrokes and sends to a 3rd party

21
Q

Trojan definition

A

Appears to perform a useful function but provides a ‘backdoor’ for data to be stolen & sent to third party

22
Q

Methods of protection against dangers that arise from use of networks (other than firewalls, antivirus programs) (3)

A
  • Keeping software updated regularly
  • Using security tools (e.g. password strength checkers)
  • Training personnel to take sensible precautions (e.g. not inserting flash memory given by a stranger)
23
Q

Disaster recovery policy purpose

A

So everyone knows how to cope in the event of a disaster where all work is potentially lost (e.g. fire)

24
Q

Disaster recovery policy aims (4)

A
  • Minimise interruptions to normal operations
  • Limit extent of disruption and damage
  • Establish alternative means of working so staff know how to proceed
  • Provide for smooth and rapid restoration of service
25
Q

Acceptable use policy purpose

A

To set out guidelines for how the system should be used

26
Q

Acceptable use policy contents (4)

A

List of unacceptable uses such as:
- visiting obscene websites
- up/downloading obscene images
- handling offensive material
- sending unsolicited emails (spam)

27
Q

Internet cookie definition

A

Little bit of data generated by website and stored on your browser
Can remember your information and how you used the site

28
Q

Why are internet cookies used

A

To provide customised web pages

29
Q

Why could internet cookies be a security issue

A

Hold personal information

30
Q

What are formal codes

A

Set of rules enforced by threat of disciplinary action

31
Q

What is an informal code

A

Expectations, customs, habits

32
Q

How does lossless compression work & results in…

A

Uses algorithms to replace common strings with tokens; can be decompressed later. Results in no loss of data quality

33
Q

Compression advantages (2) and disadvantages (2)

A

AD:
- Smaller file size - files take us less storage space
- Faster upload, download and transfer times
DISAD:
- Precision can be lost
- Not always possible to restore to original state (decompress)

34
Q

Dangers that can arise from the use of networks (8)

A
  • hacking
  • virus installation
  • malware
  • spyware
  • trojans
  • worms
  • technical breakdown
  • interception of data as it’s transferred
    DEFINITIONS
35
Q

Security tools to keep networks secure (and what they do) (5)

A
  • Regularly updated anti-virus software
  • Firewalls - monitor data in and out, prevent hackers from accessing system
  • 2-factor authentication - adds item of specific personal info. (e.g. code texted to phone)
  • different access levels
  • passwords to restrict access
36
Q

Why are backups and archiving files done?

A

As a precaution against permanent loss of data (by accident or hacking)

37
Q

File backups definition

A

Making copy of data regularly and storing it off site or in a secure location on a detachable medium (e.g. flash disc)

38
Q

Explain generations of files

A

Most recent copy of data = son file
If son file’s data is lost, father file can be used (and so on)
Order of backing up: Grandfather becomes son, father become grandfather, son becomes father

39
Q

Why should backups be made regularly

A

The older the file becomes the less likely it is to match current data

40
Q

Compression ratio equation

A

Compression ratio = original file size/compressed file size

41
Q

How does compression free up memory space

A

Makes file size smaller

42
Q

Lossy compression results in…

A

Reduction in data quality

43
Q

Dangers that can arise from using computers to store personal data (5)

A
  • Hacking (data deliberately changed/stolen/deleted - unauthorised)
  • Computer virus
  • Hard drive crash
  • Interception of data during transfer (e.g. email)
  • data stolen from thrown away hard drives
44
Q

Different access levels (3)

A
  • No access
  • Read and Write access
  • Read only access
45
Q

Suitable password requirements (4)

A
  • Strong (mixture of upper and lower case, digits, special symbols)
  • changed regularly
  • never revealed
  • not containing personal info (DOB, pet name)
46
Q

Encryption definition and example

A

Scrambling data to prevent it being understood if intercepted (a key de-crypts it)
XOR

47
Q

Archiving files - what and why

A

Storing data that’s no longer in current/frequent use but is stored for legal, historical or security reasons