Chapter 6 Flashcards
What is data privacy?
The need to restrict access to personal data from unauthorised people - keep data
confidential.
What are data protection laws? Examples?
Laws which govern how data should be kept private & secure.
- Data can only be processed for the stated purpose.
- Data must be accurate.
- Data must not be kept longer than necessary.
- Data must be kept secure.
- Data must not be transferred to another country unless that country also has adequate protection.
What is data security?
The methods taken to keep the data safe (to prevent unauthorised access to data) from accidental / malicious damage (/loss).
Also includes the methods to recover data if lost or corrupted.
How does the use of user accounts & access rights secure data?
(data security)
- Authenticate a user; username and password.
- Controls access rights; different access rights for individuals/groups of users - each username & password (each account) is linked to the appropriate level of access.
How does the use of passwords secure data?
data security
Authentication method to restrict access to data/systems.
Passwords:
1. Should be strong/hard to crack.
2. Can take the form of biometrics.
3. Should be changed frequently.
4. Use an anti-spyware software with it – to make
sure that they are not being relayed to anyone.
How does the use of biometrics secure data?
data security
Authentication method to restrict access.
Relies on the unique characteristics of human beings; fingerprint scans, retina scans, face recognition, voice recognition.
How does the use of firewalls secure data?
data security
Stops unauthorised access/hackers gaining access to the computer network;
filters all incoming & outgoing network traffic and blocks signal that do not meet requirements.
Prevent malware (viruses & spyware), phishing and pharming.
What does a strong password consist of?
data security
At least one capital letter.
At least one numerical value.
At least a special character (such as @, *, _ ).
For example: Sy12@#TT90kj=0
What does a firewall exactly do?
data security
- Examines all the traffic (incoming/outgoing data) between the private network and public network.
- Checks whether the traffic meets certain criteria.
- If the criteria fails, the firewall will block the traffic and send a warning msg to the user.
- Logs all attempts to enter the private network.
Drawbacks of firewalls:
It can’t prevent:
Individuals using their own modem to bypass firewall.
Employees’ misconduct or carelessness.
Users on stand-alone computers that disable the firewall.
How does the use of anti-virus/anti-malware software secure data?
(data security)
Carries out regular scans to detect and remove or
quarantine viruses;
Checks software/files before they are run or loaded on computer.
Compares possible viruses against a database of known viruses.
! Should be kept up to date since new viruses are constantly being discovered!
How does the use of anti-spyware software secure data?
data security
Detects and removes spyware programs installed illegally on a user’s computer.
How does the use of encryption secure data?
data security
When applied, data cannot be understood (cypher text) by unauthorised users unless they have the decryption key.
It scrambles characters, using the encryption key, making the message makes no sense.
Drawbacks of encryption?
Encryption cannot stop hacker from deleting/changing the files; it will just stop him using the data himself.
Are there any physical methods to secure data?
data security
Locked doors/keyboards/CCTV etc.
Use keypads/ biometric scans etc.
How does the use of digital signatures secure data?
A way to ensure that an electronic message or document is authentic.
Using a private encryption key the signature is paired with a public key and sent with the message.
When the message run through the public key the result should match the signature.
If they don’t then the message has been altered en route; shows that the message has been intercepted and compromised.
What are some methods of preventing accidental data loss?
- Frequent backup EITHER to secondary media/to 3rd party server/cloud/removable devices/continuous backup OR stored remotely (onto another medium away from the computer).
- Disk-mirroring strategy/RAID.
- UPS (uninterruptable power supply)/backup generator.
- Use passwords & user IDs to restrict access to authorised users only.