computing , protecting digitial devices and data Flashcards

1
Q

what is malware and what are some examples of it?

A

software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.

e.g:

virus

worms

trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can you do to protect your computer against malware?

A

use anti-malware software, resistant shield, scans, update anti-malware software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is encryption? and who is the only person that can unscramble it?

A

Encryption is where data is scrambled so that if it is accessed unlawfully then it will be meaningless to the person viewing it. When encryption is used, only the intended recipient of the data will be able to decipher (unscramble) the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is a Caesar cipher?

A

A simple method of encryption is the Caesar Cipher. A cipher is an algorithm used to convert a message into encrypted text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the problem with free public acess wifi hotspots/ wifi ?

A

Data that is sent across communication links that is not encrypted could be intercepted and viewed. This is a particular problem with wireless networks.
Most public Wi-Fi hotspots are unencrypted which means that the data that passes through the wireless network can be read by anybody with the right software connected to the same wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How can wifi be protected?

A

creating a passkey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is HTTPS

A

Websites that use encryption use the HTTPS(hypertext transfer protocol secure) protocol. This ensures that any personal data such as email address, password, and credit card details are encrypted. This can be seen in the URL’s of links and a lock is shown too.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is Acceptable Use Policy ? and what will happen if not done properly

A

An acceptable use policy (AUP)will include safe practices that users of a network will be expected to follow to keep data secure. They will also set out consequences of not following the AUP to deter users from using unsafe practices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are usually the weakest link when it comes to network security? and what are some examples?

A

People are usually the weakest link when it comes to network security. Some common problems caused by users include:
- writing passwords down
- choosing weak passwords
- sharing their password with another user
- not logging off
- not locking their computer
- leaving doors unlocked
- losing laptops / mobile phones / portable storage
- falling victim to social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What rules do the Acceptable Use Policy contain for users?

A
  • type of websites that are not allowed to be visited
  • type of activities that computers cannot be used for
  • guidance for password management
  • how to manage removable storage
  • not using somebody else’s user ID
  • not accessing data they are not authorised to access
  • which devices can or cannot be connected to the network
  • appropriate use of email
  • how to avoid social engineering scams
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what kind of guidance does acceptable use policy include?

A
  • choosing a password that can be remembered but is not obviously linked to you,
    such as your child’s name, so that it is not easy to guess.
  • how to avoid becoming a victim of social engineering. Always be suspicious. If you are in doubt, check with somebody else. You can never get in trouble for being diligent. e.g:If you receive a phone call asking you for information, inform the caller that you will call back using the phone number you find online. Never use the phone number they give to you. Never allow remote access to your computer unless you have started a support call yourself.
  • Be careful when opening an email attachment. Check the attachment is what you are expecting to see. Unless you are expecting an executable file such as .exe or .vbs then do not open it.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what kind of email attachment should you not open?

A

Unless you are expecting an executable file such as .exe or .vbs then do not open it. Similarly, do not open files which contain macros such as .docm or .xlsm unless you are expecting the file. If an attachment is a compressed file such as .zip then be suspicious. Sometimes an attachment will look genuine but when you try to open it, you receive a prompt to run a program. Never run the program. You may find an attachment that looks like it is a picture, for example jammydodger.jpg, but it’s really a program that is malware. Although the extension .jpg looks like a picture, there could be another extension at the end such as .exe. Therefore, always check the icon matches the file type.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the guidance on removable media?

A

One way of preventing malware from infecting a computer using removable media is to have a policy to never use removable media. This can be restrictive though. It is also possible for a computer system to be configured so that removable media cannot be used. This may be necessary in high security organisations like banks to prevent data from being stolen. Where removable media is used then an AUP might only allow the use of encrypted media and will have guidance for users on how to ensure they do not lose the media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a disaster recovery plan ?

A

Sometimes disasters occur such as a power cut, flood, fire, theft of data, malware, corruption of data, loss of network admin password or loss of the network manager. When this happens it is necessary to recover from the disaster. A disaster recovery plan (DRP) is needed to plan for such events so that recovery can be completed as quickly and effectively as possible, minimising disruption to the organisation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is good about backups?

A

Although backups will not prevent an attack, they make it possible to recover from an attack. Having automated backups means that the user does not have to remember to run backups. Data can be backed up to removable media, across a network or to the cloud. Storing a backup off-site or in the cloud means it is safe from a fire, flood or other disaster that could destroy the original data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what should you do to your back ups regularly?

A

Something that many network managers forget to do is to test backups regularly. It is important to know that the backup has worked and that it can be recovered if needed. Often problems with backups are not discovered until it is too late. It is therefore important to regularly test that backups have worked and can be recovered successfully.

17
Q

What is RAID?

A

RAID means redundant array of independent disks. It involves using more than one disk to achieve better performance or better reliability. Better reliability is achieved by using one or more spare(redundant)disks. Not all RAID methods provide better reliability.

18
Q

what is raid 1?

A

RAID 1 uses two or more disks where half of the disks are redundant. Where two disks are used, they both contain the same data so if one fails, the other one takes over. The failed disk can be replaced and rebuilt automatically. As half the disks are redundant, only half the capacity of all the disks is used.

19
Q

what is raid 0?

A

RAID 0 uses two disks where the data is striped across the two disks. This increases performance because data can be read from two disks at a time, but there is no spare capacity and so if one of the disks fails, then all the data on both disks is lost.

20
Q

what is raid 10?

A

RAID 10 can use four disks. Data is striped across disks 1and 2 to provide the performance of RAID 0. Disks 3and 4are copies of disks 1 and 2 to provide the reliability of RAID 1.

21
Q

what is raid 10?

A

RAID 10 can use four disks. Data is striped across disks 1and 2 to provide the performance of RAID 0. Disks 3and 4are copies of disks 1 and 2 to provide the reliability of RAID 1.

22
Q

what is the disadvantage to RAID?

A

RAID is not a substitute to a backup. It can provide quick recovery if a disk fails, but it is still at risk from viruses, accidental deletion, and theft.

23
Q

what is High Availability and Disaster Recovery?

A

A HADR solution usually involves stand-by equipment and/or stand-by premises. If a web server fails for a national train company, then it will be losing bookings from the moment it fails. It is therefore essential that there is a stand-by server in place ready to take over.