Data security Flashcards
Fire wall
Can be software or hardware accepts or rejects incoming
and outgoing packets based on criteria
pharming
redirects a user to a false
website misdirects browser to a bogus website by modifying entries on a DNS server or by being installed on your computer
anti-virus software
scans files on the hard drive
for malicious software
encryption
converts data to an alternative form which is seems like garbage information. as it is coded.
virus
Virus replicates itself, can damage computer data can cause computer malfunctions
Virus checker
Scans files stored on a computer system for malicious code
* Scans files when they enter the system / memory stick inserted /
download etc.
* Sets up a schedule for virus-checking
* Isolates / quarantines / deletes viruses
* Regularly updates the virus definitions
Spyware
spyware records / accesses data
spyware sends recorded data to third party
spyware does not replicate itself
malicious software
downloaded / installed/run without the user’s knowledge
can pretend to be / are embedded in other legitimate software when downloaded // both try to avoid the firewall
runs in the background
Hackers
Malicious and ethical -
Malicious is illegal access to a computer system, without a users permission or knowledge
Ethical - authorized by companies to check their security measures. Done with permission and a fee is paid to the ethical hacker
Phishing
(malicious) emails that direct users to fake websites
Prevention from hackers
Strong passwords, firewalls and software to detect illegal activity
Prevention from Viruses
Anti virus
:>
Prevention from phishing
Users need to be aware of these scams
Do not click on link unless the user is certain that it is safe
look out for https
Anti phishing tools on web browsers
Prevention from pharming
Antivirus software
modern web browsers
spellings of websites
green padlock symbol on the address bar
Data integrity
The accuracy, completeness and consistency data
Validation
method to make sure data that has been entered is reasonable and meets criteria
Verification
Method to make sure that data entered is correct by using double entry or visual checks and mor e
Types of validation
type - int, float etc
range - age of -120 is not possible
format - date
length - telephone
presence - something is entered
existence - something that is actually exists
limit check - upper bound, lower bound
consistency - only that number of values are entered
uniqueness - usernames
Types of verification
Double entry
Visual check
Check digits
Checksum
Parity checks
ARQ - automatic repeat request
Acknowledgement - a message is sent when the receiver showing that the data is sent correctly
Timeout - a time interval before the acknowledgement is sent again
If an error is detected in the data then the data is requested to be sent again
If there is no error then a positive acknowledgement is sent to the sender