All of it Flashcards

1
Q

Data collection methods

A

Autonomous devices

Passive and active data collection

Manual data collection

Usage data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Size of a sound file

A

File size = sample rate × sample
resolution × length of sound

Or

File size = bit rate × length of sound

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Advanced storage techniques

A

Redundant Array of Inexpensive
Disks (RAID)

Network Attached Storage (NAS)

High availability storage

Storage Area Networks usage (SAN)

Cloud storage

Hosted storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Size of an image file

A

Size of an image = row * columns * bpp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Data

A

Data can be defined as a set of recorded facts, numbers or events that has no initial meaning or structure. The main purpose of data collection is to gather information in a measured and systematic manner to ensure accuracy and facilitate data analysis. Data only becomes valuable once this has happened as it gives context and meaning in relation to why it was gathered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Methods to help store data

A

Virtualisation: Is the process of turning hardware into a software equivalent without sacrificing functionality.

Hosted instance: Instances are the virtual machines that run operating systems’ images such as Linux.

Hosted solution: When you rent a virtual server from a company that takes over the responsibility for maintaining and keeping your server running.

Clustering: A group of two or more computer systems that run in parallel together to achieve a goal.

Blockchain storage: A way of saving data in a decentralised network, which utilises the unused hard disk space of users across the world to store files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Descriptive analytics

A

It can involve breaking down data and summarising its main features and characteristics. It presents what has happened in the past without exploring why or how.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Artificial Intelligence (AI)

A

Artificial intelligence (AI) is the simulation of human intelligence processes by machines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Units of data

A

Unit Symbol Value
Byte B 8 bits
Kilobyte KB 1024
bytes
Megabyte MB 1024 KB
Gigabyte GB 1024 MB
Terabyte TB 1024 GB
Petabyte PB 1024 TB
Exabyte EB 1024 PB
Zettabyte ZB 1024 EB
Yottabyte YB 1024 ZB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

General storage methods

A

Digitally sampled sound

Bitmapped graphics

Compressed audio

Compressed video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cloud computing services

A

Data storage

E-mail

Virtualised software

Remotely hosted applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data visualisation

A

Involves presenting the data visually or graphically to detect patterns, trends and correlations that are not usually apparent from raw data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Management Information System

A

A management information system(MIS) is a collection of systems and procedures that gather data from multiple sources and compile them in a readable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Project Management Software
(PMS)

A

Project management software (PMS) is a software tool that helps organise, manage and track projects.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data Warehouse

A

A data warehouse (DW or DWH) is a
system used for reporting and data
analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Data mining

A

Data mining is considered an
interdisciplinary field that joins the
techniques of computer science and
statistics together.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Social and ethical implications of AI

A

Is it acceptable if AI becomes more knowledgeable than humans?

How many jobs will be lost to AI?

How much data does AI gather?

Does AI take away people’s privacy?

How can we safeguard AI from discrimination and bias?

Who is accountable if a wrong decision is made?

How do we know what information AI is generating?

How do we know the information generated by AI is accurate?

How do we know if AI has been manipulated?

Is AI gathering too much information?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Large data sets

A

Large data sets refer to data sets that
are too large or complex to be dealt
with by traditional data-processing
application software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Neural network modelling

A

A neural network is a series of
algorithms that tries to recognise
underlaying relationships in a set of
data through a process that mimics the
way the human brain operates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Natural Language Processing (NLP)

A

A subset of artificial intelligence is
known as natural language processing
(NLP). The aim of this subset is to
develop computer systems which can
understand text or voice data in the
same way as human beings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data Flow Diagrams (DFD)

A

Data flow diagrams (DFD) are used to
show the flow of data in a business
information system. Specific rules and
symbols must be used when creating
these diagrams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Cyber security

A

How individuals and organisations reduce the risk of cyber-attacks, and how to prevent unauthorised access to the personal information we store on our devices and online.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Risks associated with online marketing
communications:

A

Spam and unwanted e-mail

Phishing and scam attempts

Privacy concerns

Ad fraud

Brand safety

Misinformation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The importance of large data sets to
the operation and competitiveness of
organisations

A

Health sector: Electronic health records (EHRs), patient
data and clinical trial data are used to improve patient care, support medical research and streamline operations.

Finance sector: Transaction data, credit history and
market data are used to make informed investment
decisions, identify fraud and improve risk management strategies.

Retail sector: Customer data, sales data and supply chain data are used to improve marketing and sales campaigns, optimise supply chain operations and provide personalised customer experiences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

MAC addresses and MAC address
spoofing

A

The Media Access Control (MAC) address is a unique
identifier assigned to a Network Interface Controller (NIC) for use as a network address in communications within a network segment. The use of unique MAC addresses can
create security risks:
MAC spoofing

Privacy concerns

Network security

Network performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Cryptocurrencies and why they can sometimes be
associated with cyber security

A

Blockchain is a decentralised, digital ledger that records transactions across a network of computers. It uses cryptography to secure and validate transactions, ensuring that the ledger is tamper-proof. The most well-known application of blockchain technology is cryptocurrency. Blockchain technology is used in cybersecurity in the following ways:

Decentralised identity

management

Cyber threat intelligence sharing

Secure record keeping

Data privacy

Chain security

Cyber insurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Security and integrity problems during online file
updates:

A

Unauthorised access

Incomplete updates

Man-in-the-middle attacks

Denial of service

Malicious software

Rollback attacks

To mitigate these risks, organisations should use secure methods for transmitting and verifying the integrity of update files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The types and operation
of malicious software:

A

Type of malware:
Virus
Trojan
Worm
Ransomware
Adware
Spyware
Rootkit

Operations of malware:
Data theft
System disruption
Spamming
Cryptojacking
Extortion

29
Q

Accidental and malicious/deliberate damage

A

Accidental damage is any damage or loss of data that is not intentional. Actions that are intended to cause harm to data are classed as malicious damage.

Accidental:
Human error
Accidental data file deletion
Software corruption
Hardware malfunction
Natural disasters
Power failure

Malicious:
Malware
Phishing and social engineering
DDoS attacks
SQL injection
Insider threats
Ransomware

30
Q

The threats to the
privacy of the individual
from the use of data
mining:

A

Data breaches

Unauthorised data sharing

Discrimination

Profiling

Lack of control

Inaccurate data

31
Q

The legal and professional
responsibilities in identifying and
mitigating threats and vulnerabilities

A

Preventing and mitigating the damage caused by
malicious or deliberate attacks requires a multi-layered
approach that includes security awareness training,
regular security updates, penetration testing and incident
response planning.

32
Q

Black hat hacking, white hat hacking and penetration testing

A

Black hat Hacking: A hacker gains unauthorised access
to computer systems, networks or
data with malicious intent. This type of
hacking is illegal and unethical, and the
individuals who engage in it are known
as black hat hackers.

White Hat Hacking: Also known as ethical hacking, a
hacker uses hacking techniques to
improve security. White hat hackers
are security professionals who identify
vulnerabilities and weaknesses in
computer systems and networks
and report them to the relevant
organisations.

Penetration Testing: Also known as pen testing, this is a security testing technique used to
evaluate the security of a system
by simulating an attack. It identifies
security vulnerabilities and weaknesses
and provides recommendations for
improving its security.

33
Q

A range of mechanisms for attacking
vulnerabilities

A

Brute force attacks

SQL injection

Cross-Site Scripting (XSS)

Cross-Site Request Forgery (CSRF)

Buffer overflow

Remote Code Execution (RCE)

Directory traversal

Man-in-the-middle (MitM) attacks

Denial of Service (DoS) and Distributed Denial of
Service (DDoS) attacks

Social engineering

34
Q

A range of mechanisms for defence
from threats and vulnerabilities

A

Firewalls

Encryption

Access control

Antivirus software

Patches and updates

Backups

User education and awareness training

Network segmentation

Intrusion detection and prevention systems

Virtual Private Network (VPN) technology

35
Q

Security measures

A

Encryption

Firewalls

Antivirus software

Hierarchical access levels

36
Q

Biometrics

A

The use of unique physiological or behavioural
characteristics to identify individuals to provide a reliable means of identification and authentication that is difficult to imitate.

Examples include:

fingerprint recognition

facial recognition

iris recognition

voice recognition

signature recognition

behavioural biometrics.

37
Q

Biometrics Benefits and Drawbacks

A

Benefits:
Increased security
Convenience
Reduced fraud
Increased accuracy

Drawbacks:
Bias and discrimination
Cost
Technical limitations
Privacy concerns

38
Q

Cryptography

A

The practice of securing communication and data through the use of mathematical algorithms. The purpose of cryptography is to protect the confidentiality, integrity and authenticity of data.

Techniques of cryptography:

Symmetric key cryptography

Asymmetric key cryptography

Hash functions

Digital signatures

Steganography

Random number generation

Quantum cryptography

39
Q

Diagnosing and tracing data over
packet switched networks

A

Tracert: a network diagnostic tool used to track the path taken by data packets from a source computer to a destination computer.

Whois: a protocol and database system that stores information about registered domain names and the associated organisations and individuals.

IP address masking and impersonating: the process of hiding or changing the real IP address of a device or network to appear as if it originates from a different location or device.

40
Q

Resilience controls

A

Cyber resilience is the ability of an organisation to withstand and
quickly recover from cyber-attacks, system failures and other security
incidents.

40
Q

Consequences of a cyber-attack

A

Financial loss

Reputational damage

Legal liability

Intellectual property theft

System downtime

Long-term damage

41
Q

Legal and professional responsibilities

A

General Data Protection Regulation (GDPR)

Network and Information Systems Regulations (NISR)

Adherence to professional standards, such as ISO 2700

Responsibility for the protection of personal data

Duty of care to ensure the continuity of critical business functions

Ensuring the security and confidentiality of sensitive information

42
Q

Resilience controls to
prevent a cyber-attack

A

Boundary firewall and Internet gateway

Staff training

Secure system configuration

Access control

Malware protection

Patch management

43
Q

The impact of damaged software:

A

System crashes

Loss of data

Security vulnerabilities

Inefficient performance

Compatibility issues

44
Q

Effects of websites being unavailable:

A

Loss of reputation

Loss of competitive advantage

Legal and social implications

Financial loss

45
Q

Temporary or permanent loss of data and information

A

Temporary loss of data and information:
The loss of access to information due to technical issues such as power outages and system crashes.

Can usually be restored from backups or through other recovery processes.

Permanent loss of data and information:
Can occur due to physical damage to storage devices, deliberate destruction, or the permanentfailure of storage devices.

The complete and permanent destruction of information that cannot be restored.

46
Q

Resilience controls for recovery from and mitigation of a cyber-attack

A

Planning alternative premises, communication methods and facilities: Used in Business Continuity
Planning (BCP) and Disaster
Recovery Planning (DRP) to ensure
that critical business operations
can continue in the event of a
cyber-attack.

What-if scenarios:
Allows for preparation and mitigation of a cyber-attack.
Hypothetical scenarios allow organisations to plan how they would respond to a cyber-attack and identify vulnerabilities.

Regular backups of data:
Used in disaster recovery and BCP.
Backups ensure that critical data
can be restored in the event of a
data loss, minimising the impact
on the organisation.

47
Q

Social engineering

A

Social engineering attacks use deception and manipulation to trick users into revealing sensitive information or making mistakes that compromise the security of their devices.

48
Q

The legal framework to protect against social engineering

A

The Computer Misuse Act 1990: This Act makes it a criminal offence to gain unauthorised access to computer systems through hacking, viruses and other forms of cyber-attacks.

The Fraud Act 2006: This Act makes it a criminal offence to carry out deception with the intention of making a gain or causing a loss. Social engineering scams, such as phishing and vishing, are often covered under the Fraud Act.

The General Data Protection Regulation (GDPR): This regulation, which is enforced by the Information Commissioner’s Office (ICO), requires organisations to protect the personal data of individuals and to report data breaches to the ICO within 72 hours.

The Privacy and Electronic Communications (EC Directive) Regulations 2003: This regulation regulates the use of electronic communication services, including e-mail, voice calls and text messages. It requires organisations to obtain consent from individuals before sending marketing communications and to provide individuals with the option to opt out of such communications.

49
Q

Social engineering within different sectors

A

Social engineering has been used to gain access within specific sectors, including:

commerce

personal finance and home banking

process control.

50
Q

Social engineering techniques

A

Phishing: Fraudulent e-mails, text messages or websites that appear to be from trustworthy sources are used to trick victims into revealing sensitive information such as passwords, credit card numbers and bank details.

Vishing: Voice phishing uses voice calls, voicemails or interactive voice response (IVR) systems to trick individuals into revealing sensitive information or installing malware on their devices.

Baiting: When an attacker leaves a physical item, such as a USB drive or CD, in a public place with the intention of tricking someone into taking it and using it on their computer.

E-mail hacking: The unauthorised access or manipulation of someone else’s e-mail account or e-mail messages.

Pretexting: A false scenario or cover story is used to manipulate someone into divulging sensitive information or performing a certain action, e.g. opening an e-mail or responding to a message.

Quid pro quo scams: When an attacker offers something desirable or valuable to a victim in exchange for sensitive information or access to their computer, e.g. offering to provide technical support in exchange for remote access.

Active digital footprints: Information that is actively shared online (e.g. through social media) that can be used to build a more successful cyber-attack.

Passive digital footprints: Data or information left behind as a result of online activities, such as browsing history or IP addresses, that can be used to create more convincing social engineering attacks.

51
Q

The Internet

A

The Internet is a huge network of computers, servers, and other devices that are connected to each other and can communicate with one another using standardised communication protocols. This allows individuals, businesses and organisations all over the world to share information, communicate and collaborate in real-time, regardless of location.
The Internet has transformed the way we live, work and interact with each other, enabling new forms of communication and commerce, and has become an essential tool for people and businesses.

52
Q

Standards

A

Internet standards are essential for ensuring the interoperability, functionality and security of the Internet. They define the protocols, technologies and practices used to transmit information and provide common ground for communication between different devices and systems. The World Wide Web Consortium (W3C) and the Internet Engineering Task Force (IETF) are two key organisations that play a role in the development and maintenance of Internet standards. The W3C focuses on developing standards for the World Wide Web including HTML, CSS, and JavaScript. The IETF develops and maintains technical standards for the Internet as a whole.

53
Q

Functionality provided by DNS

A

Load balancing

Redirection

Authentication

Service directory

54
Q

The infrastructure of the Internet

A

Servers

Data centres

Network routers

Fibre optic cables

Wireless towers

55
Q

Hardware components of computer
networks

A

Routers

Switches

Firewalls

Hubs

Bridges

Access points

Modems

Network interface card
(NIC)

56
Q

Software components of computer
networks

A

Operating systems

Network management

Network security software

Communication protocols

Network performance monitoring and analysis tools

Virtual private network

Remote access software

Back-up and recovery

57
Q

Infrastructure components of
computer networks

A

Cables and wiring

Network servers

Storage area networks

Wireless access points

Data centres

Network racks and
cabinets

Power back-up systems

Cooling systems

58
Q

Packet switching

A

Packet switching is the method used to transmit data over a network using the Internet protocol. It works by dividing large amounts of data into smaller, manageable units called packets and then transmitting each packet individually over the network.

59
Q

How technology
supports mobile phone
communication

A

Mobile phone
masts

Cells

Handoffs

Base station
controller

IMIE and IMSI

SIP

SS7

IPv6

60
Q

Routing

A

In TCP/IP networks, routing refers to the process of determining the path an IP packet should take to reach its destination.

61
Q

Hubs

A

A hub is a networking device that allows multiple devices to be connected to a single network.

62
Q

Switched hubs

A

Switched hubs, also known as switches, are advanced versions of traditional hubs and provide dedicated connections between devices, allowing for faster data transmission and reduced network congestion.

63
Q

Cloud computing and cloud storage

A

Cloud computing involves the delivery of a range of computing services over the Internet, while cloud storage refers specifically to the storage of data on remote servers. Cloud computing can include cloud storage, but it also includes other services such as processing power, software, and more.

64
Q

Routers

A

Routers are networking devices that forward data packets between computer networks.

65
Q

Repeaters

A

Repeaters are networking devices used to extend the range of a network.

66
Q

Wireless access points

A

Wireless access points (WAPs) are networking devices that enable devices to connect to a wireless network and access network resources, such as the Internet.

67
Q

Media converters

A

Media converters are networking devices used to convert signals from one type of physical medium to another.

68
Q

Transmission speeds

A

The formula for calculating transmission speeds:
Transmission speed= file size/time taken to transfer a file

When considering the end user experience, it is important to consider the user’s expectations and the purpose of the file transfer. To improve the end user experience, it may be necessary to optimise the transfer or provide alternative methods of file transfer, such as compression or streaming.

Factors that can affect the transmission speed and file delivery time include:

network bandwidth

congestion

latency

file size

file type.