Network security Flashcards
Data Protection Act
What do we mean by information commissioner
the person responsible for enforcing the Act. They also promote good practice and make everyone aware of the implications of the Act.
Data Protection Act
Subject access - subjects are able to see information held. This is to let then check it is correct.
if the information is wrong, what are their rights?
- have the right to compensation if they have incurred loss or injury as a result
- have the right to having the information changed or deleted
Anti-Virus Software (anti-malware Software)
do anti-virus soft ware need to be up to date?
Yes, it is very important
What is this?
Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
One of the eight Data Protection Principles in the Data Protection Act 1998
What does a firewall monitor?
A firewall monitors the data which flows through the ports
Data Protection Act
What do we mean by personal data?
data about a living identifiable person, which is specific to that person
In which network policy are you likely to find the following content?
No installing of software and downloading files from the WWW
Acceptable Use Policy
What keep ports closed and open only those that they expect data to be sent to. For example, incoming emails are usually sent to port 110.?
Firewall
Network Policies
For what policy are these the four key aspects?
- When
- Where
- What
- How
Back up policy
Data Protection Act
What do we mean by data subject?
the living individual whom the personal information is about
Anti-Virus Software (anti-malware Software)
What are viruses?
small programs which aim to cause active harm to a computer system
Data Protection Act
What do we mean by personal data
- Data about an identifiable person
- who is living
- and is specific to that person.
- Can include: date of birth, medical details, credit history, salary, qualifications, religious beliefs, etc.
Data Protection Act
When would someone
- have the right to compensation if they have incurred loss or injury as a result
- have the right to having the information changed or deleted?
If, in a Subject Access request, if the information is wrong
Network Policies
What is likely to be included in an Acceptable Use Policy?
They may include rules / procedures such as:
Use complex passwords
Have different levels of access (only certain people in a company can access sensitive data)
Locking computers if the user leaves their desk
No installing of software and downloading files from the WWW
No use of USB sticks
What is this?
Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes
One of the eight Data Protection Principles in the Data Protection Act 1998
When files are sent across the internet, they are broken down into small packets of data.
The part of the computer which receives these packets is made up of how many ports
(You can think of these ports like a country’s ports, which manage people in and out of the country)
256
How do you encrypt data?
To encrypt data, an encryption key is used which will convert ‘plain text’ into ‘cipher text’.
Why are User Access levels important?
Access levels are important to ensure that employees cannot view sensitive company information (payroll etc) and cannot sabotage vital system data
In which network policy are you likely to find the following content?
Locking computers if the user leaves their desk
Acceptable Use Policy
How does cipher text get converted back to plain text?
For the ‘cipher text’ to be converted back to ‘plain text’, the same key is required by the recipient to reverse the encryption
What are some Physical Security measures?
Magnetic swipe cards Biometrics Thumb print Retina scan Facial recognition
What is this?
Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes
One of the eight Data Protection Principles in the Data Protection Act 1998
Anti-Virus Software (anti-malware Software)
What are small programs which aim to cause active harm to a computer system?
Viruses
The Data Protection Act 1998 contains how many Data Protection Principles
Anyone processing personal information has to process data according to these principles
eight
Data Protection Act
What do we mean by data holder / controller
the person whose responsibility it is in an organization to control the way that personal data is processed.
What software’s aim is to spy on the user and send back as much information about them as possible (passwords, usernames, websites they visit, purchases they have made).
Spyware