Data Integrity and security Flashcards

1
Q

What is data integrity?

A

Data integrity relates to the consistency, accuracy and reliability of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the goal of data integrity?

A

The goal of data integrity is to protect against data being changed, deleted or substituted without authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name ATLEAST 4 ways in which data integrity can be comprimised

A
  1. Human error (Innacurate data entry, accidental changing of data)
  2. Natural Disasters
  3. Worms and viruses
  4. hardware malfunctions
  5. Fraud
  6. Malicious deletion or changing of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is data security?

A

Data security means protecting information from unauthorized access, use, disclosure, disruption, modification or destruction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

*What are the 2 types of data security?

A

Physical ( e.g: locks, fireproof safes etc)

Software( e.g: audit trails, passwords etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name ATLEAST 5 methods of physical data security

A
  1. Locks
  2. Security Guards
  3. Burglar Alarms
  4. Monitoring system using video cameras
  5. Biometric scans
  6. Electronic doors that can only be opened using passwords
    or magnetic cards
  7. Outer structural security
  8. Storing data in a fireproof safe or cabinet
  9. Storing data in another building or in another location
  10. Distributing work to a number of employees instead of
    just one
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name ATLEAST 4 methods of software based data security

A
  1. Password for the system
  2. Password for individual files or folders
  3. Audit trials or access logos
  4. Encryption – This is encoding(scrambling ) data during
    storage or transmission so that it cannot be understood.
  5. Firewall-This is a program, a hardware device or a
    combination of both that filters the information coming in
    through your computer system or network connection or
    internet
  6. Antivirus software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a computer virus?

A

A computer virus is a small program written to alter the way a
computer operates, without the permission or knowledge of
the user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a worm?

A

Worms are programs that replicate themselves from system
to system without the use of a host file. This is in contrast to
viruses, which requires the spreading of an infected host
file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a trojan horse

A

Trojan horses are impostors—files that claim to be

something desirable but, in fact, are malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is data privacy?

A

Information privacy, or data privacy is the relationship
between collection and dissemination of data,
technology, the public expectation of privacy, and the
legal and political issues surrounding them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name ATLEAST 4 computer crimes

A
  1. Software piracy
  2. Hacking
  3. Cracking
  4. Internet Fraud
  5. Industrial espionage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

define biometrics

A

Biometrics is the automated method of recognizing a
person based on a physiological or behavioral
characteristic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

List ATLEAST 4 types of biometric input

A
  1. Fingerprints
  2. Face Recognition
  3. Speaker Recognition
  4. Iris Recognition
  5. Hand and Finger Geometry
  6. Signature Verification
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define the term: computer crime

A

criminal
activity involving an information technology
infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a phishing scam?

A

Phishing is a type of online scam where criminals impersonate legitimate organizations via email, text message, advertisement or other means in order to trick users into giving away sensitive data

17
Q

What is ransomware?

A

Ransomware is a type of malware from cryptovirology that threatens to publish the victim’s personal data or perpetually block access to it unless a ransom is paid

18
Q

What is Spyware?

A

Spyware is any software that installs itself on your computer and starts covertly monitoring your online behavior without your knowledge or permission