LU7 - Errors, Threats and Security (Protocols) Flashcards
Human Errors GIGO
Garbage in Garbage Out
If invalid data is entered the output will be invalid
Rounding Arithmetic error
Numbers are rounded, accuracy is lost on the decimal places after the rounding took place
Truncating Arithmetic Error
Truncating a real number to an integer loses all decimal values
Fixed Number Of Bits Arithmetic Error
The number of bits available determines the highest and lowest number that can be contained.
If number is outside of that range, it cannot be stored
Overflow Arithmetic Error
This is related to the number of bits available for a particular data type. Calculations that result in answers that exceed the maximum value will still be stored, but the answer will be incorrect
Data Transmission Errors
If data doesn’t reach its location in the same condition it was sent, there was probably corruption.
- Atmospheric conditions
- Attenuation
- Magnetic or electrical interference
Programming errors
Responsible for catastrophic failure of systems, can cause loss of life
or
syntax errors
mistakes in the source code, such as spelling and punctuation errors, incorrect labels
logic errors
A logic error is classified as a type of runtime error that can result in a program producing an incorrect output. It can also cause the program to crash when running.
runtime errors
Occurs when a program is syntactically correct but contains an issue that is only detected during program execution.
Verification
A systematic process for evaluating performances and compliance of a set of data
By checking
Completeness
Correctness
Cosistency
RFID
Use of radio signals to transfer data from a tag attachment to an object
No power is required as the tags are read using magnetic fields
ACCCR
Accuracy
Correctness
Currency
Completeness
Relevance
Accuracy
Degree to which the stored value measures against the true value
Correctness
Data is correct if it confirms to an approved or conventional standard or agreeing with fact, logic
Data can be valid, but incorrect
Currency
Data is current if it is up to data or not outdated
Completeness
data is complete if all required data is known
Relevance
Data is relevant to a situation/problem scenario and can contribute to providing meaningful information about the situation/problem
Hardware Failure
Component can no longer perform its task and a chain reaction of other important tasks not being able to be performed
Storage
The inability to read data from the hard drive can render a computer useless
Power failure
Data Damage
Possible diaphragm damage
A surge is usually stopped by a electrical circuit breaker outside computer, found in POWER SUPPLY UNIT (PSU)
Malware
Networks are susceptible to malicious software entering environment
by going through firewall or through software sources (Flash Drive or portable media
Phishing or Spoofing
A convincing email sent to user to click on link
Identity theft, fraudulent email activity where parts of email look like it was sent from someone else
Virus
A virus attaches itself to a program or file that is then pread from one computer to another leaving a copy of itself
Trojan Horse
Is a seemingly harmless program that when activated causes harm to computer
Spyware
Software that spies on computer, can capture information.
web browsing habits, email messages, usernames and passwords
Pharming
Is an intended attack to redirect a websites traffic to another fake site
Ransomeware
Prevents or limits the user from accessing their computer system until they have paid ransom through an online payment system
Denial Of Service Attack (DOS)
Attempts to make server or network unavailable to its users or host
Attack comes from one computer
Distributed Denial Of Service Attack (DDOS)
Attack that uses more than one computer and one internet connection when leading a DDOS attack
Open Ports
All communications that happen over the internet is exchanged via ports
Botnets
Also called zombie army
Several internet computer that have been set up to forward transmissions to other computers on the internet without the knowledge of their owners
Wi-Fi Vulnerability
Open Wi-Fi Networks are all around us and our mobile devices are likely connecting to them without our consent
they are unsecured networks
UPS (Uninterruptible Power Supply)
Electrical device that provides emergency power to electrical equipment when the normal power supply fails
Redundant Power Supply (RPS)
A Single piece of computer equipment operates using two or more physical power supplies
Firewall
Set of related software and hardware that protects the resources of a private network from users on other networks
Audit Trails
Is a trail record, showing who has accessed a computer system and what operations the user performed during a given time period
Anti-malware
Best protection against new malware that compare may encounter
Updates rules faster than antivirus
Anti-virus
A software application that will prevent, detect and remove malware infections on computer, servers and networks
Anti-spam
A spam filter is a program used to detect and block these messages from coming into server
Spam is irrelevant or unsolicited messages sent over the internet