Data protection Flashcards

1
Q

Which is more important? Data or Hardware? And why exactly?

A

Data is more valuable than the hardware.
Companies are more interested in securing
their data than in protecting the computers
themselves.
Computer hardware is easier to replace than
data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List some ways that you can lose valuable data:

A

Not saving work as it is being created and then the
software crashes or the machine shuts down.
Saving over a file by accident.
Deleting a file by accident.
Not saving files with sensible file names, and no matter how hard you try, you can’t find them again when you need them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

List some ways of data theft

A

Hackers, Industrial espionage, viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hacker?

A

A hacker is a person who breaks codes and

passwords to gain unauthorized entry to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an example of industrial espionage?

A

Employees may steal the company’s data to sell

to other rival companies or to set up their own business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What’s a computer virus?

A

A Computer Virus is a computer program
that is designed to copy itself repeatedly and
attach itself to other computer programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name some physical ways data can be lost

A

Fire, floods and lightning damage, Theft of equipment,
lmao, miss added this part “If your computer is stolen then all of your data will end up walking out of the door with the thief.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Name some physical protection:

A

Closed-circuit TV monitors
Lock the room when not in use and bolt computers to
the desk.
Computer-controlled locks that check employee badges.
Biometric recognition, such as fingerprints, retina scans and voice
Access codes
Electronic alarm systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ways in which we can back it up

A

Back-up is the process of making a copy of the
data and storing it on CD-RW, magnetic tapes or
zip drives.
When the data is lost, it can be recovered by
copying the backup onto the computer.
Backing up should use the
“Grandfather-Father-Son” method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Some more ways we can back it up ahaha back it uppp shawtyy also we gots to save it btw.

A

Data should be backed up on a regular basis
and should be placed in a safe location or
off-site.
Fire-proof cabinets can be used to store backup copies. A fire-proof cabinet is a cabinet designed to withstand the high temperatures of a fire.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Software restrictions

A

User Ids and Passwords
Software Installation Keys
Encryption
Firewalls

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

User id and passwords

A

Usernames and passwords are used to gain
access to a system.
This reduces the risk of outsiders accessing
the network and getting to the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Software installation keys

A

When you buy software you are given a key
to enter when installing the software.
If the correct key is not entered then the
the installation will not continue.
This is an attempt to cut down on software
piracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Encryption?

A

method of scrambling data in such a way
that only the people who have the ‘secret key’ to
unlock the message can read it.
This is what an encrypted code for the text would
look like:
lj86ik,£lj)ay%9w2+m?lsild171724
jkd2f*hkdfh7$171kjfh7d1h4d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s a firewall?

A

program or hardware device that filters the information coming through the Internet connection into your personal computer or into a company’s network.
i.e.you can go out onto the Internet and access pages,
but it checks everything coming back against a set
of rules. If the data coming back is from an
unauthorized source, then it is blocked.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly