LO3.3 Flashcards

1
Q

What are the the four types of cyber security controls?

A

Physical
Hardware
Software
Encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three examples of physical cyber security controls?

A

Biometrics
Swipe Cards
Alarms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are three examples of hardware cyber security controls?

A

SmartWater
Cable Locks
Safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are three examples of software cyber security controls?

A

Firewall
Anti-Malware
Operating System Updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are three examples of encryption?

A

Asymmetric encryption
Symmetric encryption
Cryptography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the difference between Asymmetric and Symmetric encryption?

A

Symmetric encryption uses the same key for encryption and decryption, while asymmetric encryption uses two different keys, a public key for encryption and a private key for decryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does cryptography differ to encryption?

A

Cryptography is coding messages whereas encryption is more specifically making data indecipherable for humans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are two common procedures in place for cyber security?

A

Access management
Data Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is access management?

A

The process of granting authorised users access to a computer system and withholding that same access to unauthorised users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data backup?

A

The process of copying and/or archiving data so they can be restored should the date be lost from a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How would an organisation mitigate the risks that come from remote and mobile working?

A

Increased levels of monitoring
Training users in cyber security
Ensuring all mobile devices have a baseline of security configuration
Keep information storage upon a mobile device to a minimum
Encrypt all data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly