LAB2 - Prevention and management of threats to data Flashcards

1
Q

5 user access restrictions

A

Physical security measures, passwords, using correct settings and levels of permitted access, biometrics, 2-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

1 advantage of physical security measures

A

Prevents attackers from gaining direct and physical access to locations where data is stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

2 disadvantages of physical security measures

A

Expensive, some methods (CCTV) do not stop data being stolen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3 security techniques for physical security measures

A

Electronic swipe lock, secured device (steel cable and lock), CCTV camera

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

2 advantages of passwords

A

Simple and easy, no costs involved - no specialist hardware required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3 disadvantages of passwords

A

Only effective if passwords are kept secret, strong or frequently changed passowords may be hard to remember, specialist software may be used to work out passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Advantage of using correct settings and levels of permitted access

A

No problems caused by unauthorised changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

2 disadvantages of using correct settings and levels of permitted access

A

Technical staff required to set up permissions, access levels need to be set at the right level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

5 biometric examples

A

Voice recognition, retina scan, iris recognition, fingerprint scan, facial recognition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

2 advantages of biometrics

A

Users do not need to remember passwords or update them regularly, cannot be guessed/lost/forgotten

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 disadvantages of biometrics

A

Expensive - specialist hardware required, some users may feel storing theiir biometric data is an invasion of privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 factors of 2-factor authentication

A

What you know (PIN/password), what you have (swipe card/mobile phone), who you are (biometric example)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Advantage of 2-factor authentication

A

Provides a higher level of security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3 disadvantages of 2-factor authentication

A

Some factors may get lost, take longer to gain access, requires hardware/software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

6 data level protection techniques

A

Firewall, software/interface design, anti-virus software, device hardening, procedures for backing up and recovering data, encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define software firewall

A

runs on an individual PC or laptop to reject unwanted internet traffic.

17
Q

Define hardware firewall

A

a dedicated computer set up to run firewall software that monitors all traffic flowing between the internet and organisation’s network.

18
Q

3 software/interface design techniques

A

Obscuring data entry (protects against shoulder surfing), autocomplete (avoids remembering, display other user’s inputs), “stay logged in” (speeds up process, security risk if different user gains access)

19
Q

Advantage of anti-virus software

A

Protects computers from known malware

20
Q

Disadvantage of anti-virus software

A

Virus signatures must be updated regularly as new malware appears all the time

21
Q

8 device hardening techniques

A

Install firewall, install anti-virus software, Uninstall programs/services that are no longer required, remove old user accounts, use strong passwords, ensure default passwords are changed, restrict user access, ensure security patches are up to date

22
Q

Advantage of device hardening

A

Protects a system from a range of attacks

23
Q

Disadvantage of device hardening

A

Requires technical staff to stay up to date with the latest security threats and apply measures correctly

24
Q

4 procedures for backing up and recovering data

A

Backup done daily or weekly (outside working hours), carried out automatically or manually, physical backups stored in a fireproof box on site or off site, restoring data on the backup into the repaired/new computer

25
Q

2 disadvantages of encrypting stored data

A

If the encryption key is lost, data may be unrecoverable, encrypting a large amount of data can take time

26
Q

Disadvantage of encrypting transmitted data

A

Encrypted data can still be stolen and is possible to crack if a weak encryption technique is used

27
Q

3 ways to find weaknesses and improve system security

A

Ethical hacking, penetration testing, analyse system data/behaviours

28
Q

Define ethical hacking

A

When an attack is stimulated on an organisation’s IT systems to highlight weaknesses and vulnerabilities.

29
Q

Define white/grey hat hacker

A

White - authorised by an organisation to test systems. Grey - discover vulnerabilities without an invitation, may alert organisation and break laws but do not hack for personal gain.

30
Q

Advantage of ethical hacking

A

Helps to find insecure areas (loopholes) in network security

31
Q

3 disadvantages of ethical hacking

A

Expensive, trustworthiness of ethical hacker, may view as an invasion of privacy

32
Q

What are the 5 stages of penetration testing?

A
  1. Discuss and agree. 2. Studies organisation on public domain. 3. Carries out pen test (social engineering and cyberattack techniques). 4. Results and data is collected and analysed. 5. Reports back with results and recommendations.