D2 - Protecting Data Flashcards

1
Q

What are the different types of techniques to protect your data? ( 7 )

A
  • file permissions
  • access levels
  • backup & recovery procedures
  • passwords
  • physical access controls
  • digital certificates
  • protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are File Permissions?

A
  • Set who can access certain files
  • Read-Only: can be opened & viewed
  • Read/Write: can be opened, viewed & edited
  • Full Control: can be opened, viewed, edited, modified & deleted

Protection from hacking & accidental damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are Access Levels?

A
  • Who can access what on user profile login including software, data, service
  • Highest level= administrator access, a user can access all folders-full control, alter permissions of users & install/delete software

Prevents malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Backup & Recovery Procedures?

A
  • Copy of data in a secondary location to original one ( cloud = remote backup)

Full Backup - all data, time consuming, more storage capacity needed

Incremental Backup - data that has changed since previous backup, quicker and less storage

Differential Backup - full backup (once a week) & incremental back (everyday)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are Passwords?

A
  • they must be shared/write it down
  • use different passwords for different user accounts
  • minimum 8-10 characters length
  • uppercase, lowercase letters, numbers & symbols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are Physical Access Controls?

A

Access Cards - must be scanned (photo & name)
Keypad Access Control
Biometric Access Control (fingerprint)

Electronic Locks All of the above require this to lock/unlock doors electronically, when signals sent from access control systems

  • Prevents malicious users, theft of equip, loading malware onto system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Digital Certificates?

A

(public keycertificates -> from certificate authority)

  • To authenticate a user as owner of a public key, can use public key infrastructure for secure encrypted communication over internet ( HTTPS, S=Secure)
  • Digital signature & public key verifies senders identity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Protocols?

A
  • Set of rules defines a method for transmitting data over internet

-Secure Sockets Layer, SSL
-Transport Layer Security, TLS, (newer one)

HTTPS, protocol used

  • Prevents malicious user reading & misusing data if intercepted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an Anti-Virus?

A
  • Utility Program, prevents malicious software infecting PC & removes malicious software
  • It analyses malware & identifies a pattern for the malware code & compares it to programs on your hard disk to identify viruses
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Features and Negatives of an Anti-Virus ( 3 features and 3 negatives)

A

Features:
- Scheduled scans can be set to run automatically
- Full scans initiated on demand for entire hard disk/specific folders
- On access scanning of all files opened/docs, programs (real-time protection)

Negatives:
- Must be regularly maintained & updated for latest virus definitions
- Doesn’t offer total protection - takes time to create new definitions
- Can slow down PC & network performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a FireWall?

A
  • Hardware / Utility device, monitors incoming & outgoing network traffic & blocks anything suspicious
  • Packet filtering - firewall inspects each data packet of data & compares it to pre-defined security rules. If a packet is flagged it stops it from passing through the firewall
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Features and Negatives of FireWalls (3 Features and 3 Negatives)

A

Features:
- Content filtering, certain traffic allowed through
- Controlling which programs can access LAN
- Intruder detection & prevention to identify & stop hackers from gaining access to your network/PC

Negatives:
- Lower network performance if poorly configured
- Less productivity as content may be blocked
- Can’t prevent internal attacks in network. Viruses can change setting on firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Encryption?

A
  • Data that is converted to coded form to prevent unauthorised access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of data that is encrypted? ( 2 different types )

A

Stored Data - data at rest -> symmetric encryption/private key encryption. A certain key is used to encrypt & decrypt data
Negatives:
- If the key is lost, the data can’t be decrypted to plain text form
- Sharing encryption key = less security

Data During Transmission - bank details
public key encryption/ asymmetric, different keys to encrypt and decrypt
Negatives:
- Large amount of data = impact on processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Different Legislation & Codes of Practice

A
  • Data Protection Act 1998 , how individuals data can be handled and used
  • Computer Misuse Act 1990 , Protects againsts harm & damage of IT Systems & data
  • Informations Commissioners Office (ICO) , responsible for enforcing data protection act & codes of practice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly