Chapter 6 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What is data privacy?

A

The need to restrict access to personal data from unauthorised people - keep data
confidential.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are data protection laws? Examples?

A

Laws which govern how data should be kept private & secure.

  1. Data can only be processed for the stated purpose.
  2. Data must be accurate.
  3. Data must not be kept longer than necessary.
  4. Data must be kept secure.
  5. Data must not be transferred to another country unless that country also has adequate protection.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is data security?

A

The methods taken to keep the data safe (to prevent unauthorised access to data) from accidental / malicious damage (/loss).
Also includes the methods to recover data if lost or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does the use of user accounts & access rights secure data?
(data security)

A
  1. Authenticate a user; username and password.
  2. Controls access rights; different access rights for individuals/groups of users - each username & password (each account) is linked to the appropriate level of access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How does the use of passwords secure data?

data security

A

Authentication method to restrict access to data/systems.

Passwords:
1. Should be strong/hard to crack.
2. Can take the form of biometrics.
3. Should be changed frequently.
4. Use an anti-spyware software with it – to make
sure that they are not being relayed to anyone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How does the use of biometrics secure data?

data security

A

Authentication method to restrict access.

Relies on the unique characteristics of human beings; fingerprint scans, retina scans, face recognition, voice recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does the use of firewalls secure data?

data security

A

Stops unauthorised access/hackers gaining access to the computer network;
filters all incoming & outgoing network traffic and blocks signal that do not meet requirements.

Prevent malware (viruses & spyware), phishing and pharming.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does a strong password consist of?

data security

A

At least one capital letter.
At least one numerical value.
At least a special character (such as @, *, _ ).
For example: Sy12@#TT90kj=0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does a firewall exactly do?

data security

A
  1. Examines all the traffic (incoming/outgoing data) between the private network and public network.
  2. Checks whether the traffic meets certain criteria.
  3. If the criteria fails, the firewall will block the traffic and send a warning msg to the user.
  4. Logs all attempts to enter the private network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Drawbacks of firewalls:

A

It can’t prevent:
Individuals using their own modem to bypass firewall.
Employees’ misconduct or carelessness.
Users on stand-alone computers that disable the firewall.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does the use of anti-virus/anti-malware software secure data?
(data security)

A

Carries out regular scans to detect and remove or
quarantine viruses;
Checks software/files before they are run or loaded on computer.
Compares possible viruses against a database of known viruses.

! Should be kept up to date since new viruses are constantly being discovered!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does the use of anti-spyware software secure data?

data security

A

Detects and removes spyware programs installed illegally on a user’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does the use of encryption secure data?

data security

A

When applied, data cannot be understood (cypher text) by unauthorised users unless they have the decryption key.
It scrambles characters, using the encryption key, making the message makes no sense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Drawbacks of encryption?

A

Encryption cannot stop hacker from deleting/changing the files; it will just stop him using the data himself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Are there any physical methods to secure data?

data security

A

Locked doors/keyboards/CCTV etc.

Use keypads/ biometric scans etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does the use of digital signatures secure data?

A

A way to ensure that an electronic message or document is authentic.

Using a private encryption key the signature is paired with a public key and sent with the message.
When the message run through the public key the result should match the signature.
If they don’t then the message has been altered en route; shows that the message has been intercepted and compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are some methods of preventing accidental data loss?

A
  1. Frequent backup EITHER to secondary media/to 3rd party server/cloud/removable devices/continuous backup OR stored remotely (onto another medium away from the computer).
  2. Disk-mirroring strategy/RAID.
  3. UPS (uninterruptable power supply)/backup generator.
  4. Use passwords & user IDs to restrict access to authorised users only.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some of the biggest security issues?

A

Hacking, Malware, Phishing, Pharming.

19
Q

What is hacking?

A

Malicious hacking:
Illegal access to private and confidential data/a computer system without the owner’s permission.
Can delete, alter or corrupt data.

Ethical hacking:
Authorised by companies to check their security measures and how robust their computer systems are.

20
Q

Hacking safeguards:

A
  1. Firewalls.
  2. Strong passwords and IDs.
  3. Biometrics.
  4. Two –step verification.
21
Q

Examples of malware:

A

Viruses, worms, logic bombs, trojan horses, bots (internet robots), spyware.

22
Q

What is a virus?

A

Program that can replicate itself with the intention of deleting or corrupting files stored on computer, or cause the computer to malfunction (crash/run slow).

23
Q

Virus safeguards:

A

Anti-virus software.
Don’t use software from unknown sources.
Be careful when opening emails/attachments from unknown senders.
Firewall / Proxy server.

!Backups cannot protect from viruses since a file might have already been infected!

24
Q

What are worms?

A

Stand alone virus that can replicate themselves with the intention of spreading to other computers.
Use networks to search out computers with weak security.

25
Q

What are logic bombs?

A

Code embedded in a program on computer.

When certain conditions are met (e.g. specific date) they are activated to carry out malicious tasks.

26
Q

What are trojan horses?

A

Malicious programs often disguised as legitimate software.

They replace all or part of the legitimate software with the intent of harming a user’s computer.

27
Q

What are bots?

A

Not always harmful; used to search automatically for an item on the Internet.
Can cause harm by taking control over a computer system and launching attacks.

28
Q

What is a spyware/key-logging software?

A

Software that gathers information by monitoring key presses on the user’s keyboard; the information is then sent back to the person who sent the software.

It can:
Install other spyware.
Read cookie data.
Change a user’s default browser.

29
Q

Spyware safeguards:

A

Anti-spyware software.
Using mouse – drop down boxes / onscreen keyboard.
Two-step verification.
Firewall / Proxy server.

30
Q

What is phishing?

A

A legitimate-looking email urges you to click a hyperlink so that you visit a fake website where you will be asked to enter sensitive/personal information.
Email appears to come form a trusted source.

31
Q

Phishing safeguards:

A

Do not click on links unless certain that is safe to do so.
Run anti-phishing toolbars on web browsers.
Look out for https and/or green padlock in the address bar.
Check regularly online accounts & change passwords frequently.
Run a firewall.

32
Q

What is pharming?

A

Malicious code installed on a user’s hard drive or on the web server.
The code will redirect URL requests of the user to a fake website without their knowledge, to steal sensitive information.

33
Q

Pharming safeguards:

A

Anti-spyware software can identify and remove the pharming code from the hard drive.
Be cautious and look out for clues that you are being redirected to another website.
Checking the spelling of websites.
Look out for https and/or green padlock in the address bar.

34
Q

Data loss due to hardware fault safeguards:

A

Use back-ups onto another medium.
Use uninterruptable power supply (USP).
Save data on a regular basis.
Use parallel systems as back-up hardware.

35
Q

Data loss due to software fault safeguards:

A

Use back-ups.

Save data on a regular basis.

36
Q

Data loss due to incorrect computer operation safeguards:

A

Use back-ups.

Training for the users so they are aware of the correct operation of hardware.

37
Q

What is data integrity?

A

Deals with validity of data.
Ensures that data is accurate, consistent, up to date.
Makes sure data is not corrupted after, for example, being transmitted.

38
Q

What two methods do we use to ensure data

integrity?

A
  1. Validation.

2. Verification.

39
Q

What can decrease data integrity?

A

Data entry & data transmission stages.
Malicious attacks on the data.
Accidental loss caused through hardware issues.

40
Q

Validation:

A

(to validate the data)
Ensures data is reasonable (and within a given criteria).

  1. Range checks.
  2. Type checks.
  3. Length checks.
41
Q

Verification:

A

(to verify if data is “correct”)
Checks if data input/transmitted matches original.

  1. Double data entry.
  2. Visual checks.
  3. Parity checks.
42
Q

Validation checks:

A
Type. 
Range. 
Format.
Length.
Presence.
Existence.
Limit check. 
Consistency check. 
Uniqueness check.
43
Q

Verification checks during data entry:

A

Double entry;
Data is entered twice, using two different people, and then compared. If there are differences an error message is displayed requesting to re-enter the data.

Visual check;
Entered data is compared with the original document – manual check by the user who entered the data. Data is shown asking for confirmation that it is correct before continuing.

Check digits;

44
Q

Verification checks during data transmission:

A

Checking if data is corrupted or lost during data transfer.

Parity checking.
Check sum.
ARQ.