Data protection Flashcards

1
Q

give 6 types of data

A
  • personal
  • client
  • employee
  • special category (minority group ect)
  • financial
  • intellectual property
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

give the 4 types of cyber threats

A

cyber attacks
phishing
malware
trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are cyber attacks

A

unauthorised attemps to access / steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is phishing

A

fraudulent attempts to access snsetive into by passive off as being trustworthy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is malware

A

malicious software designed to distrupt, damage or access systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are trojans

A

malware designed as legitimate software to trick users into installing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

how does the data protection act and general data regulation (GDPR) ensure personal data is collected, stored and used responsibly

A
  • supporting lawful processing of data
  • protect individuals data
  • regulate data sharing
  • strengthen rights
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the gdpr

A

an eu regulation that combines data protection laws across europe, it protects personal information by outlining several requirements businesses must follow to process data legally.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is the data protection act 2018

A

a uk law that implements the gdpr regulations and sets guidelines on how businesses should handle personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

give responsible data handling principles

A
  • only collect data for specific and explicit purposes
  • not keeping data for longer than needed
  • accurate and up to date data
  • fair, lawful, limited
  • and transparent data collection
  • security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what must businesses do to comply with ensure data protection

A
  • comply with laws
  • protect personal data from unauthorised access
  • ensuring data is securely stored and transmitted
  • clear policies and procedures
  • regular reviews of data protection measures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

how to reduce the risk of cyber attacks

A
  • keep software up to date
  • identify and fix vulnerabilities
  • intrusion detection systems
  • multifactor authorisation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to reduce the risk of phishing

A
  • staff training on how to recognise it
  • simulating phishing attempts to raise awareness of what they may look like
  • email filtering systems
  • reminder banners on emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

how to protect against malware

A
  • antivirus software installed and up to date
  • education to raise awareness
  • reminder banners on emails
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

how to protect against trojans

A
  • system installed that detect them
  • anti malware tools and security software
  • dont download unverified software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is version control

A
  • prevents use of incorrect or outdated info to avoid errors
  • ensures only the latest version of data is used
  • helps track changes and maintains document history for legal purposes
  • teams can see shared documents to ensure everyone has access to up to date and correct data
17
Q

how does access control help protect data

A
  • restricts data
  • only access to necessary data
  • keep detailed logs of who accessed what and when
18
Q

how is indexing useful in data control

A

organised data management makes it easier to locate and revive