D2 - Protecting data Flashcards

1
Q

Ways of protecting data - File permissions

A

Set who can access the file permissions

Read only - Can be opened, viewed but not edited

Read/write - Opened, viewed and edited

Full control - Opened, viewed, edited, modified and deleted

Protect from all threats especially hacking and accidental damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ways of protecting data - Access levels

A

What software, data and services a user can access

Highest level is administrator access which has access to all files with full control

Lowest end a user can only access a limited number of files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ways of protecting data - Backup

A

Biggest impact from a threat is loss of data as it could make a business fall

Regular backups should be made. “Remote” backup

Full Backup - Complete backup of all data, excellent protection, time consuming and needs high amounts of data storage

Incremental Backup - Backups data that has been edited since the previous backup, much quicker and need less storage space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ways of protecting data -

Passwords

A

Prevents unauthorised access and should be kept a secret

Should not be repeatedly used

Should have at least 10 characters

Containing upper and lower case letters, numbers and symbols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ways of protecting data - Physical access control

A

Access cards - Scan card to unlock room, encoded to work on certain doors

Keypad access control - Requires a passcode to gain entry

Biometric - Scans biometric data, fingerprint, iris and facial

Electronic lock - Require electronic locks to be used to lock and unlock doors

Prevents malicious users from accessing IT systems, theft and someone loading malware onto the systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ways of protecting data -

Digital certificates

A

Used to verify identity of business when performing a transaction

Used to encrypt data when sending

How websites get HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ways of protecting data - Protocols

A

Rules that defines a method for transmitting data between two devices

SSL/TLS are used to ensure data is encrypted so if intercepted cannot be read

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are antivirus, their features and implications

A

Used to prevent malicious software from infecting computer

Detects and removes malicious software

Features in anti virus software- Scheduled scans that can be set on specific days, full scans on hard disk, real time protection - scanning files that are opened

Implications of anti virus software - Regularly maintained and updated,
doesn’t offer full protection., new malware everyday
slow down PC and network performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are firewalls, their features and implications

A

Monitors incoming and outgoing network traffic

Blocks any traffic deemed suspicious

Packet filters which inspects each packet of data and if the packet is flagged by rules then its prevented passing through

Features of firewall - Content filtering is where certain traffic is allowed through and some is not, for productivity and security reasons, controls which programs can access LAN, intruder detection to stop hackers from gaining access

Implications of firewalls - Diminish performance of network, productivity can impaired as content needed may be blocked, cannot prevent internal attacks within network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption in stored data

A

Data stored on computer should also be encrypted just to be sure

Adds extra level of security

Uses symmetric encryption which uses the same key to encrypt and decrypt data

Implications of encrypting data - Losing encryption key means data is lost forever as it can not be decrypted, sharing key can compromise security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Encryption during data transmission

A

Data MUST be encrypted to prevent anyone from intercepting

Encrypt data in transit using asymmetric encryption. Uses two different keys to encrypt and decrypt

Sending data -
Look up person public key (digital certificate)

Apply data and encryption to produce ciphertext

The recipient would the decode using their private key which is unknown

Public key cannot decrypt

Implications - Large data can have impact on processing power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Legislation to protect systems

A

Data Protection Act (1999) - Protects how persons data is used and handled. If broke: Fined up to £50,000

Computer Misuse Act (1990) - Protects against the willful harm and damage of IT systems. If broke: 2-10 years in prison

Freedom of Information Act (200) - Release information in response to requests from public

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Impact of legislations

A

Data protection act requires personal daat not to be shared without the permission of the person

Also allows people to ask for information held by the organisations

Information act was used to create greater transparency for government bodies. Has revealed surprising data such as MP expenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Information Commissioner’s Office (ICO)

A

Professional body which produces codes of practice for the protection of data

Not law but guidelines to help organisations cimpy with the laws

Codes of practice of handling data is important as they enforced Data Protection Act

Also has guidelines for individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly