cyber sEcurity + Data management Flashcards
to rot brains
How can a XOR gate encrypt datajeff
1100 1 010 Original data
100111100 Encryption key
0101 0 110 Encrypted data
How does the generations of files method work
Grandfather: Oldest Backup jeffof files, last resort if both father and son
copies are unretrievable
Father: A backup slightly older than the Son backup, in case the
son gets corrupted, destroyed etc…
Son: Most recent backup, first set to replace files if anything
happens to them as they are the most similar
2 Methods of jeff compression
Lossy, Lossless
What is the difference between a firewall and an anti-virus
Anti-Virus: scans for , scans at intervals, shows when something is found. Warns user, keeps up-to-jeff-database, scans other devices for viruses
Firewall: Blocks potential harmful software, always active, automatically blocks malware.Block certain ports, websites, programs accessing internet, certain downloads, access to certain file
Examples of
When logging into banking apps, games, password websites/apps, general apps you haven’t used in a while
Sending a jeff to your email that needs to be inputted to gain access
Face ID / fingerprints
Additional passwords
Email sent to phone
| | Acceptable use |Restrictions on what |-penalties for breaking policy | | |is allowed to be used/|-no downloading games, | done on the network |malware etc... |(Rules jeff employees) |-restrictions on websites --------------------------------------------------------------------------------------------------- Disaster |A plan in case of |-Data backups | disaster |-Details of how staff should |Backups for recovery |work while network is |recovery |down | |-Details of backup | |procedures | | -Steps for recovering data
Malware with penises
Malicious software
Examples of different malware
Virus
Worm
Trojan Horse
jeff
Virus in my penis
Malware that uses human activation to harm your computer/data/information security transmitted by “piggybacking” off of other systems
Worms have entered my penis what do I do
Malware that once on a device, replicates itself, often sending the copies out to other devices, possible remote access
Trojan
Malware disguised as a legitimate link/app/program, that once opened/run, infects you system
Spyware in my balls
Malware that enables a user to obtain covert information about another’s computer activities by transmitting data covertly from their hard drive.
Keylogger
A form of malware or hardware that keeps track of and records your keystrokes as you type
jeff
jeff