LOGICAL PROTECTION Flashcards

1
Q

Usernames and passwords

1a. Describe why usernames and strong passwords are necessary. [2]
1b. State 3 rules for choosing a strong password. [3]

A

usernames must be matched with a secure password to minimize the chances of unauthorized users accessing a system.
passwords should contain a mix of uppercase and lowercase letters, punctuation and numbers.
passwords should be a substantial length and should be regularly changed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anti - malware

Describe the purpose of anti-virus and anti-spyware software. [4]

A

anti virus system scans a system and removes viruses. if left to infect a system, a virus could delete data or permit access to unauthorized users

anti spyware software removes spyware on an infected system so that hackers cannot view personal data or monitor users.

organizations should install and regularly update anti virus or anti spyware programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

firewall

Describe the roles of a firewall. [4]

A

Firewalls prevent unauthorised access to or from a network.

Firewalls filter data packets and block anything that is identified as harmful to the computer system or network.
Firewalls can also be used to block access to specific websites and programs.
A firewall can be in the form of a physical device which is connected to the network, or software installed on a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Encryption

Explain what encryption is. What are the two types? [4]

A

Encryption is the conversion of data (plaintext) into an unreadable format (ciphertext) so it cannot be understood if intercepted.
Encrypted data can only be understood by an authorized system with a decryption key.
There are two types of encryption.
Encryption at rest is when data is encrypted while it is being stored on a system or storage drive.
Encryption in transit is to secure the data as it being transferred between systems on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tiered levels of access

Why would an organization use tiered levels of access? What are the 3 levels of file access? [5]

A

The purpose of tiered levels of access is to grant different types of permission to certain users.
Managing levels of file access ensures that only authorized people can access and change certain files.
There are different levels of file access:
No access
Read-only - Allows a user to view but not edit.
Read/write - Allows a user to view and edit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

obfuscation

What is obfuscation? State a scenario in which it would be used. [3]

A

Obfuscation is when data is deliberately changed to be unreadable to humans but still understandable by computers.
Program code might be obfuscated to stop rival programmers from viewing and stealing it if they were able to access it.
Specialist software can be used to obfuscate data and convert it back into a human-readable format.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly