Keeping data safe Flashcards

1
Q

Threats to data

A
  1. accidental damage or loss
  2. natural disaster
  3. malicious actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Natural disaster

A

floods, fires, hurricanes, tsunamis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accidental damage

A

Unintended corruption, deletion or damage to data that is usually caused by human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malicious actions

A

Deliberate unauthorised actions intendedto cause damage by viewing, deleting, copying or corrupting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Types of accidental damage

A

human error- data entry, accidental deletion
physical damage- dropping device and damage hard drive
power failure - electrical components damaged
hardware failure - hard disk crash
software crashing - in middle of operation and data lost

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Types of malicious actions

A

hacking
malware
theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

6 examples of physical security

A
  1. Issuing all staff with ID badges
  2. Having all visitors to a building sign in on arrival
  3. Having all visitors escorted around the building 4. Keeping sensitive areas locked
  4. Security guards
  5. Biometric security e.g. fingerprint
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Backups

A

Made regularly so that data lost or corrupted can be restored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Archiving

A

Used for data that is no longer needed for immediate processing, but needs to be kept

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

9 ways to reduce risk of malicious actions

A
  1. Install anti-virus/anti-malware/anti-hacking software
  2. Encrypting data so that only authorized parties can understand the information
  3. Using strong passwords
  4. Don’t download software from unknown sources
  5. Be careful when opening email attachments and don’t click suspicious links
  6. Make sure you are protected by a firewall
  7. Keep all software, including operating systems, up to date
  8. monitoring of staff computer activity
  9. verification can be used to get confirmation from a user e.g. deleting a file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

5 ways of reducing risk of accidental damage or loss

A
  1. Locking workstations when unattended
  2. Saving work on a regular basis in case of unexpected shutdown
  3. Keep storage devices in a safe place
  4. Set data to read only to prevent accidental editing
  5. Password protecting individual files
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Secure passwords

A

Use a minimum number of ___ characters
Use a mixture of numbers, lowercase and uppercase characters
Include special characters such as &, !, #, %
Do not include your name, DOB or personal details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Audit trails

A

maintains a record of all activity that has taken place on a computer system
Every time a user accessed the system, the time and date are logged along with their actions
It can assist in detecting security violations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly