Learning Aim D - Protecting Data and Information Flashcards

1
Q

Give three characteristics of threats to data

A

Using obvious passwords, giving your passwords to others, leaving your device unlocked. Some others are using the same login details, posting information on the internet without judging whether it is sensible or not and using your personal phone or device for a business operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give three examples of Malware

A

Trojans, Ransomware, Worms, Spyware, Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Malware?

A

Malware is software designed to harm your device or put your data at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are trojans?

A

Trojans are a type of malware that mislead the user into thinking that the software they have downloaded is legitimate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is ransomware?

A

Ransomware is a type of malware that locks specific data and blackmails you or requests money from you in order for you to get access to that data again.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are worms?

A

Worms are a very dangerous type of malware as they do not need human assistance to spread. They can easily infect entire networks of devices and can be done through old drivers and phishing emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spyware?

A

Spyware does not harm your device but instead compromises your data. The type of information stolen varies but it can be anywhere from personal information to banking details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is adware?

A

Adware is a very common type of malware that enters your device through unreliable software. Adware can also be a carrier for other types of malware e.g adware can plant spyware on your computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are hackers?

A

Hackers are people who exploit weaknesses in an IT system in order to gain unauthorised access. Although not all hackers are bad as some are hired to test a companies defence against specific types of attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A

Phishing is the process of getting someone to reveals their personal information. The most common way of phishing is through and email where the person pretends to be someone from a reputable company.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is accidental damage?

A

Not all threats to data have to be done with malicious intent. A good example of this is accidental damage, this is typically damage done when a file is deleted on accident or a drink is spilled on the device damaging it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name a method for protecting data

A

Antivirus software, Firewalls, Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is antivirus software?

A

Antivirus software is used for protection against malware and the removal of malware on your device. Antivirus will typically isolate dangerous files and ask you what to do when a dangerous file appears.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are firewalls?

A

Firewalls monitor incoming and outgoing network traffic. They are used to block suspicious packets from attacking your device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly