Data Security & Integrity Processes Flashcards

1
Q

Threats of no privacy and security

A

Unauthorised access
Disclosure of data to people not entitled to have access to it
Disruption of data in transit from one place to another
Unauthorised modification of data
Destruction or loss of data
Destruction or loss of storage media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Protection: Standard clerical prosedures

A

Removal of data prohibited by a policy
Removal of USB ports from machines to prevent theft of data
Only hiring employees with no criminal record
Regular backing up of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Protection: Levels of permitted access

A

Employees can only access what they need to access
Different users will be able to read some data, read all data, write data to existing tables and create and remove tables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Protection: Passwords

A

Complex - combination of upper case, lower case, numeric and symbols
Imposing a minimum number of characters
Changed often, minimising risks if a password is compromised

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Protection: Write-protect mechanisms

A

A setting that can be applied to disk drives or certain folders
Write-protected data can be read but not changed of deleted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Accidental Damage

A

Data may be lost, but no one deliberately intended for it to be lost.
A person accidentally deleting a record
A computer or server crash
A loss of power before a file was saved
Destruction of equipment due to fire or flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Malicious Damage

A

When a person sets out with the specific intent to cause damage to data.
A hacker gaining access to a system and changing/deleting information.
A virus, Trojan horse or worm being introduced to a system.
An employee of an organisation damaging or destroying data for their own gains.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Black hackers

A

Black hackers break into systems for their own purposes such as financial or
political gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

White hackers

A

White hackers use their skills to break into systems to expose flaws and
advise how they can be fixed. They are usually hired by companies to test.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Grey hackers

A

Grey hackers are the same as white hackers however are not hired by
companies but do it anyway to expose the flaws. They hope to be hired by
the company but they are at risk of the computer misuse act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus

A

A virus attaches itself to a host program. The host file has to be opened for the virus to spread. They become resident in memory once they are run. They infect other uninfected files by copying themselves.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms

A

Worms are similar to viruses; however, they can spread without the need for human interaction. They can self-replicate. Worms can easily be spread through a lack of knowledge and awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojans

A

Programs which contain trojans appear useful but once installed the program has a hidden agenda and is often used to create backdoors to your system. These are then used to exploit your system by people with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Contingency planning: Before the disaster

A

Before the disaster: risk analysis, preventive measures including offsite backup and staff training to ensure that when a disaster happens, loss of data is minimised and the company has ensured that the data can be recovered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Contingency planning: During the disaster

A

During the disaster: staff response - implement contingency plans that prevent further damage to the data and begins immediate recovery of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Contingency planning: After the disaster

A

After the disaster: recovery measures, purchasing replacement hardware, reinstalling software, restoring data from backups restores normal running and recovers all data.