Data protection Flashcards
Which is more important? Data or Hardware? And why exactly?
Data is more valuable than the hardware.
Companies are more interested in securing
their data than in protecting the computers
themselves.
Computer hardware is easier to replace than
data
List some ways that you can lose valuable data:
Not saving work as it is being created and then the
software crashes or the machine shuts down.
Saving over a file by accident.
Deleting a file by accident.
Not saving files with sensible file names, and no matter how hard you try, you can’t find them again when you need them.
List some ways of data theft
Hackers, Industrial espionage, viruses.
What is a hacker?
A hacker is a person who breaks codes and
passwords to gain unauthorized entry to computer systems.
What is an example of industrial espionage?
Employees may steal the company’s data to sell
to other rival companies or to set up their own business.
What’s a computer virus?
A Computer Virus is a computer program
that is designed to copy itself repeatedly and
attach itself to other computer programs.
Name some physical ways data can be lost
Fire, floods and lightning damage, Theft of equipment,
lmao, miss added this part “If your computer is stolen then all of your data will end up walking out of the door with the thief.”
Name some physical protection:
Closed-circuit TV monitors
Lock the room when not in use and bolt computers to
the desk.
Computer-controlled locks that check employee badges.
Biometric recognition, such as fingerprints, retina scans and voice
Access codes
Electronic alarm systems
Ways in which we can back it up
Back-up is the process of making a copy of the
data and storing it on CD-RW, magnetic tapes or
zip drives.
When the data is lost, it can be recovered by
copying the backup onto the computer.
Backing up should use the
“Grandfather-Father-Son” method.
Some more ways we can back it up ahaha back it uppp shawtyy also we gots to save it btw.
Data should be backed up on a regular basis
and should be placed in a safe location or
off-site.
Fire-proof cabinets can be used to store backup copies. A fire-proof cabinet is a cabinet designed to withstand the high temperatures of a fire.
Software restrictions
User Ids and Passwords
Software Installation Keys
Encryption
Firewalls
User id and passwords
Usernames and passwords are used to gain
access to a system.
This reduces the risk of outsiders accessing
the network and getting to the data.
Software installation keys
When you buy software you are given a key
to enter when installing the software.
If the correct key is not entered then the
the installation will not continue.
This is an attempt to cut down on software
piracy.
What is Encryption?
method of scrambling data in such a way
that only the people who have the ‘secret key’ to
unlock the message can read it.
This is what an encrypted code for the text would
look like:
lj86ik,£lj)ay%9w2+m?lsild171724
jkd2f*hkdfh7$171kjfh7d1h4d
What’s a firewall?
program or hardware device that filters the information coming through the Internet connection into your personal computer or into a company’s network.
i.e.you can go out onto the Internet and access pages,
but it checks everything coming back against a set
of rules. If the data coming back is from an
unauthorized source, then it is blocked.