LU7 - Errors, Threats and Security (Protocols) Flashcards

1
Q

Human Errors GIGO

A

Garbage in Garbage Out
If invalid data is entered the output will be invalid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Rounding Arithmetic error

A

Numbers are rounded, accuracy is lost on the decimal places after the rounding took place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Truncating Arithmetic Error

A

Truncating a real number to an integer loses all decimal values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fixed Number Of Bits Arithmetic Error

A

The number of bits available determines the highest and lowest number that can be contained.

If number is outside of that range, it cannot be stored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Overflow Arithmetic Error

A

This is related to the number of bits available for a particular data type. Calculations that result in answers that exceed the maximum value will still be stored, but the answer will be incorrect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Transmission Errors

A

If data doesn’t reach its location in the same condition it was sent, there was probably corruption.

  • Atmospheric conditions
  • Attenuation
  • Magnetic or electrical interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Programming errors

A

Responsible for catastrophic failure of systems, can cause loss of life

or

syntax errors
mistakes in the source code, such as spelling and punctuation errors, incorrect labels

logic errors
A logic error is classified as a type of runtime error that can result in a program producing an incorrect output. It can also cause the program to crash when running.

runtime errors
Occurs when a program is syntactically correct but contains an issue that is only detected during program execution.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Verification

A

A systematic process for evaluating performances and compliance of a set of data

By checking
Completeness
Correctness
Cosistency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

RFID

A

Use of radio signals to transfer data from a tag attachment to an object

No power is required as the tags are read using magnetic fields

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ACCCR

A

Accuracy
Correctness
Currency
Completeness
Relevance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Accuracy

A

Degree to which the stored value measures against the true value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Correctness

A

Data is correct if it confirms to an approved or conventional standard or agreeing with fact, logic

Data can be valid, but incorrect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Currency

A

Data is current if it is up to data or not outdated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Completeness

A

data is complete if all required data is known

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Relevance

A

Data is relevant to a situation/problem scenario and can contribute to providing meaningful information about the situation/problem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware Failure

A

Component can no longer perform its task and a chain reaction of other important tasks not being able to be performed

17
Q

Storage

A

The inability to read data from the hard drive can render a computer useless

18
Q

Power failure

A

Data Damage
Possible diaphragm damage

A surge is usually stopped by a electrical circuit breaker outside computer, found in POWER SUPPLY UNIT (PSU)

19
Q

Malware

A

Networks are susceptible to malicious software entering environment

by going through firewall or through software sources (Flash Drive or portable media

20
Q

Phishing or Spoofing

A

A convincing email sent to user to click on link

Identity theft, fraudulent email activity where parts of email look like it was sent from someone else

21
Q

Virus

A

A virus attaches itself to a program or file that is then pread from one computer to another leaving a copy of itself

22
Q

Trojan Horse

A

Is a seemingly harmless program that when activated causes harm to computer

23
Q

Spyware

A

Software that spies on computer, can capture information.

web browsing habits, email messages, usernames and passwords

24
Q

Pharming

A

Is an intended attack to redirect a websites traffic to another fake site

25
Q

Ransomeware

A

Prevents or limits the user from accessing their computer system until they have paid ransom through an online payment system

26
Q

Denial Of Service Attack (DOS)

A

Attempts to make server or network unavailable to its users or host

Attack comes from one computer

27
Q

Distributed Denial Of Service Attack (DDOS)

A

Attack that uses more than one computer and one internet connection when leading a DDOS attack

28
Q

Open Ports

A

All communications that happen over the internet is exchanged via ports

29
Q

Botnets

A

Also called zombie army

Several internet computer that have been set up to forward transmissions to other computers on the internet without the knowledge of their owners

30
Q

Wi-Fi Vulnerability

A

Open Wi-Fi Networks are all around us and our mobile devices are likely connecting to them without our consent

they are unsecured networks

31
Q

UPS (Uninterruptible Power Supply)

A

Electrical device that provides emergency power to electrical equipment when the normal power supply fails

32
Q

Redundant Power Supply (RPS)

A

A Single piece of computer equipment operates using two or more physical power supplies

33
Q

Firewall

A

Set of related software and hardware that protects the resources of a private network from users on other networks

34
Q

Audit Trails

A

Is a trail record, showing who has accessed a computer system and what operations the user performed during a given time period

35
Q

Anti-malware

A

Best protection against new malware that compare may encounter

Updates rules faster than antivirus

36
Q

Anti-virus

A

A software application that will prevent, detect and remove malware infections on computer, servers and networks

37
Q

Anti-spam

A

A spam filter is a program used to detect and block these messages from coming into server

Spam is irrelevant or unsolicited messages sent over the internet