LO6: Protection Methods Flashcards

To know all the protection methods and what they do to help protection.

1
Q

Name 3 types of physical protection methods?

A
3 Of:
Physical Locks
Bio-metrics and keypads
Backups 
Security Staff
Putting computers in high ground places for floods
Shredding old paper based records
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 3 logical protection methods

A
Passwords/usernames
Firewall
Encryption
Obfuscation
Anti-malware/virus
Permissions
Encryption of data in transit
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the difference between encryption at rest and in transit?

A

Encryption at rest is data encrypted on say a hard drive, Transit means the data is encrypted during communication/transmission across a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does an anti-malware protect a device?

A

Stops infections from malware
Stops data from being stolen from said malware
Can help protect against phishing scams as they can scan domains you access
Stops infections spreading from device to device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why are tiered levels of access to data effective?

A

They stop new employees from accessing data they don’t need and requires specific authorisation to access data at different parts of an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

State some of the downsides to encryption at rest

A

Slow to decrypt/encrypt

If the encryption key is lost the data is most likely lost forever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does shredding of paper documents help maintain security?

A

Destroys physical records
Ensures that it’s very difficult to figure out the original contents
Without it, full documents containing sensitive data could be taken when discarded of

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some of the possible impacts of a security breach?

A

Loss of intellectual property
Loss of services and access to said services
Failure to secure confidential info
Loss of information belonging to a third party
Loss of reputation
National security threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the impacts that come with a loss of reputation

A

Fewer sales
Less trust from consumers
Incident paints the organisation in a bad light for a long time to come
Loss of investment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the impacts that come with a Loss of information belonging to a third party?

A
Customers lose trust
Possible legal issues if measures were not properly in place to protect third party data
Loss of sales
Loss of the data itself to attackers
Data theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why might a company backup data to another location?

A

To mitigate data loss
To increase redundancy
In an area prone to environment threats it would be wise to backup data far away in the case of a disaster
As part of their Disaster Recovery Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly