CHAPTER 6 Flashcards
1
Q
Data Protection Law ( Guide )
A
- Fairly and lawfully processed
- Only process for stated purpose
- Data must relevant and not excessive
- Data must be accurate
- Not kept longer than necessary
- Process in accordance with right
- Data must be kept secure
- Data not be transferred to other country unless the country has adequate protection
2
Q
What is data integrity ?
A
- Validity of data
- Freedom of error
- Data is accurate
- Data is up to date
2
Q
What is data security ?
A
- Protect data from illegal access
- Protect data from lost and data can be recovered if lost
- Deals with data protection
3
Q
What are user account used for ?
A
- ## To authenticate a user ( Prove )
4
Q
What is use of password ?
A
- Accessing email account
- Carrying out online banking or shopping
- Accessing social networking sites
5
Q
How to protect password ?
A
- Run anti-spyware software
- regularly change password
- Make hard password
6
Q
What does strong password contain ?
A
- Capital letter
- Numbers
- Symbol
7
Q
Digital signature
A
- Protect data by providing a way of identifying the sender
8
Q
What is data privacy ?
A
- To keep the data private
- Only use for the purpose agreed
9
Q
Threat to data and computer system
A
- Individual , careless
- Internal mismanagement , theft
- Natural disaster , flood
- Unauthorized access into system , hackers
- Malicious software , virus
- System weakness , power failure
10
Q
Malware
A
- Malicious software that has the intention of causing harm
11
Q
Virus
A
- Triggered to replicate itself inside
12
Q
Worm
A
- Run independently and transfer itself to other network
13
Q
Logic bomb
A
- Stay inactive until some condition met
14
Q
Trojan horse
A
- Downloaded as useful program
15
Q
Spyware
A
- Collect information and transmit
16
Q
Malware ( Activity involve )
A
- Phishing
- Pharming
- Keylogger
17
Q
Comparison between virus , worms and trojan horse
A
- How infection
- How reproduction
- How trigger
- How Attack
- How spread
18
Q
Security measures to protect computer
A
- Disaster recovery
- Safe system update
- User authentication
- Firewall
- Good practice
- Malware detection software
19
Q
Disaster recovery
A
- Ensure the system continuously working
20
Q
Safe system update
A
- Replacement of a new system
- Keep original system
21
Q
User authentication
A
- Best practice for creating multiple user account
- Verification of a user’s identity
( Password , Biometric , Security token )
22
Q
Firewall
A
- Hardware/Software that monitor and control network traffic
- Act as security gate
23
Q
Good Practice
A
- Not leaving computer unattended
- Privately accessing the computer
- Do no write details ( Password )
24
Q
Malware detection software
A
- Install antivirus
- Do regular scanning
25
Q
Reason for data lost
A
- Malware attack
- System crash
- File is erased
- Disk corrupted
- Damaged disk
- Location of the file forgotten
26
Q
Backup procedure
A
- Incremental backup , overnight
- Full backup , weekend
- Backup disk is stored away from the system
- Disk mirroring strategy
27
Q
Security measure for data
A
- Anti-virus software
- Malware detection
- Backup policy
- Encrypted data
28
Q
Data validation technique
A
- Length
- Range
- Character
- Format
- Presence
- Limit
- Type
- Existence
29
Q
Verification method
A
- Parity check
- Check sums