Data security Flashcards

1
Q

Fire wall

A

Can be software or hardware accepts or rejects incoming
and outgoing packets based on criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

pharming

A

redirects a user to a false
website misdirects browser to a bogus website by modifying entries on a DNS server or by being installed on your computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

anti-virus software

A

scans files on the hard drive
for malicious software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

encryption

A

converts data to an alternative form which is seems like garbage information. as it is coded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

virus

A

Virus replicates itself, can damage computer data can cause computer malfunctions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus checker

A

Scans files stored on a computer system for malicious code
* Scans files when they enter the system / memory stick inserted /
download etc.
* Sets up a schedule for virus-checking
* Isolates / quarantines / deletes viruses
* Regularly updates the virus definitions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spyware

A

spyware records / accesses data
spyware sends recorded data to third party
spyware does not replicate itself
malicious software
downloaded / installed/run without the user’s knowledge
can pretend to be / are embedded in other legitimate software when downloaded // both try to avoid the firewall
runs in the background

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hackers

A

Malicious and ethical -
Malicious is illegal access to a computer system, without a users permission or knowledge
Ethical - authorized by companies to check their security measures. Done with permission and a fee is paid to the ethical hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Phishing

A

(malicious) emails that direct users to fake websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Prevention from hackers

A

Strong passwords, firewalls and software to detect illegal activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Prevention from Viruses

A

Anti virus
:>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Prevention from phishing

A

Users need to be aware of these scams
Do not click on link unless the user is certain that it is safe
look out for https
Anti phishing tools on web browsers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prevention from pharming

A

Antivirus software
modern web browsers
spellings of websites
green padlock symbol on the address bar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data integrity

A

The accuracy, completeness and consistency data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Validation

A

method to make sure data that has been entered is reasonable and meets criteria

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Verification

A

Method to make sure that data entered is correct by using double entry or visual checks and mor e

17
Q

Types of validation

A

type - int, float etc
range - age of -120 is not possible
format - date
length - telephone
presence - something is entered
existence - something that is actually exists
limit check - upper bound, lower bound
consistency - only that number of values are entered
uniqueness - usernames

18
Q

Types of verification

A

Double entry
Visual check
Check digits
Checksum
Parity checks

19
Q

ARQ - automatic repeat request

A

Acknowledgement - a message is sent when the receiver showing that the data is sent correctly
Timeout - a time interval before the acknowledgement is sent again
If an error is detected in the data then the data is requested to be sent again
If there is no error then a positive acknowledgement is sent to the sender