Network security Flashcards

1
Q

Data Protection Act

What do we mean by information commissioner

A

the person responsible for enforcing the Act. They also promote good practice and make everyone aware of the implications of the Act.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data Protection Act

Subject access - subjects are able to see information held. This is to let then check it is correct.

if the information is wrong, what are their rights?

A
  • have the right to compensation if they have incurred loss or injury as a result
  • have the right to having the information changed or deleted
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anti-Virus Software (anti-malware Software)

do anti-virus soft ware need to be up to date?

A

Yes, it is very important

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is this?

Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.

A

One of the eight Data Protection Principles in the Data Protection Act 1998

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does a firewall monitor?

A

A firewall monitors the data which flows through the ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Data Protection Act

What do we mean by personal data?

A

data about a living identifiable person, which is specific to that person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In which network policy are you likely to find the following content?

No installing of software and downloading files from the WWW

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What keep ports closed and open only those that they expect data to be sent to. For example, incoming emails are usually sent to port 110.?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Network Policies

For what policy are these the four key aspects?

  • When
  • Where
  • What
  • How
A

Back up policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Data Protection Act

What do we mean by data subject?

A

the living individual whom the personal information is about

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Anti-Virus Software (anti-malware Software)

What are viruses?

A

small programs which aim to cause active harm to a computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Protection Act

What do we mean by personal data

A
  • Data about an identifiable person
  • who is living
  • and is specific to that person.
  • Can include: date of birth, medical details, credit history, salary, qualifications, religious beliefs, etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Protection Act

When would someone
- have the right to compensation if they have incurred loss or injury as a result

  • have the right to having the information changed or deleted?
A

If, in a Subject Access request, if the information is wrong

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Network Policies

What is likely to be included in an Acceptable Use Policy?

A

They may include rules / procedures such as:
Use complex passwords
Have different levels of access (only certain people in a company can access sensitive data)
Locking computers if the user leaves their desk
No installing of software and downloading files from the WWW
No use of USB sticks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is this?

Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes

A

One of the eight Data Protection Principles in the Data Protection Act 1998

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When files are sent across the internet, they are broken down into small packets of data.

The part of the computer which receives these packets is made up of how many ports
(You can think of these ports like a country’s ports, which manage people in and out of the country)

A

256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How do you encrypt data?

A

To encrypt data, an encryption key is used which will convert ‘plain text’ into ‘cipher text’.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why are User Access levels important?

A

Access levels are important to ensure that employees cannot view sensitive company information (payroll etc) and cannot sabotage vital system data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In which network policy are you likely to find the following content?

Locking computers if the user leaves their desk

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How does cipher text get converted back to plain text?

A

For the ‘cipher text’ to be converted back to ‘plain text’, the same key is required by the recipient to reverse the encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are some Physical Security measures?

A
Magnetic swipe cards
Biometrics 
Thumb print
Retina scan
Facial recognition
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is this?

Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes

A

One of the eight Data Protection Principles in the Data Protection Act 1998

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Anti-Virus Software (anti-malware Software)

What are small programs which aim to cause active harm to a computer system?

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The Data Protection Act 1998 contains how many Data Protection Principles
Anyone processing personal information has to process data according to these principles

A

eight

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Data Protection Act

What do we mean by data holder / controller

A

the person whose responsibility it is in an organization to control the way that personal data is processed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What software’s aim is to spy on the user and send back as much information about them as possible (passwords, usernames, websites they visit, purchases they have made).

A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Anti-Virus Software (anti-malware Software)

What spies on users, recording key strokes etc. but do not aim to harm the system – just the user

A

Spy ware

28
Q

Anti-Virus Software (anti-malware Software)

What is spy ware?

A

spies on users, recording key strokes etc. but do not aim to harm the system – just the user

29
Q

What does the Data Protection Act cover?

A
  • The misuse of personal data

by organizations and businesses

30
Q

What is an encryption key?

A

An encryption key is an algorithm which will systematically alter each piece of data in a file. For example, a key may convert each letter in a text file to the next letter in the alphabet:
e.g. ‘hello’ becomes ‘ifmmp’

31
Q

Network security

What are 8 threats to network security?

A
  • Hackers
  • Viruses
  • Trojans
  • Worms
  • Spyware
  • Adware
  • Fraud
  • Identity theft
32
Q

Anti-Spyware Software (Anti-Malware Software)

What software does this describe?

The reason for collecting this data is so that ‘senders’ of the software can use this information to steal your identification or sell your information to third parties who will then target you with advertisements.

A

spy ware

33
Q

What is this?

Personal data shall be processed in accordance with the rights of data subjects under this Act.

A

One of the eight Data Protection Principles in the Data Protection Act 1998

34
Q

What is this?

Personal data shall not be transferred to a country or territory outside the European Economic Area (EEA) unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

A

One of the eight Data Protection Principles in the Data Protection Act 1998

35
Q

What are the following?

1) Personal data shall be processed fairly and lawfully.
2) Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes
3) Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
4) Personal data shall be accurate and, where necessary, kept up to date
5) Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
6) Personal data shall be processed in accordance with the rights of data subjects under this Act.
7) Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
8) Personal data shall not be transferred to a country or territory outside the European Economic Area (EEA) unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

A

These are the eight Data Protection Principles in the Data Protection Act 1998

36
Q

Anti-Spyware Software (Anti-Malware Software)

What is spyware’s aim?

A

to spy on the user and send back as much information about them as possible (passwords, usernames, websites they visit, purchases they have made).

37
Q

What is this?

Personal data shall be processed fairly and lawfully.

A

One of the eight Data Protection Principles in the Data Protection Act 1998

38
Q

Data Protection Act

What do we mean by the following

  • The Information Commissioner needs to know that an organization is processing personal information.
  • Notification involves the data holder telling the Information Commissioner what personal data is processed and why it is processed.
A

Notification by the data holder

39
Q

What are these?

Magnetic swipe cards
Biometrics 
Thumb print
Retina scan
Facial recognition
A

Physical Security measures

40
Q

What is important about passwords? (3 things)

A

Passwords are in place to ensure that a network has no unauthorised access.

It is important that passwords are strong (long and with a combination of alpha and numeric characters) so that they are harder for hackers to crack

They should also be changed regularly.

41
Q

Data Protection Act

What do we mean by the person whose responsibility it is in an organization to control the way that personal data is processed.

A

Data holder/ controller

42
Q

What is encryption?

A

Encryption is where data is scrambled before being sent across a network so that it is unreadable if intercepted.

43
Q

What are five of the seven exemptions to the Data Protection Act?

A

1) Where data is used for personal, family or household use
2) Where the data is used for preparing text (e.g. references)
3) Where the data is being used for the calculation of pay or pensions
4) Where data is being used for mailing lists provided only name and address details are stored
5) Data used for the prevention or detection of crime
6) Data used for the apprehension or prosecution of offenders
7) Data used for the assessment or collection of tax or duty

44
Q

In which network policy are you likely to find the following content?

Use complex passwords

A

Acceptable Use Policy

45
Q

What are these?

1) Where data is used for personal, family or household use
2) Where the data is used for preparing text (e.g. references)
3) Where the data is being used for the calculation of pay or pensions
4) Where data is being used for mailing lists provided only name and address details are stored
5) Data used for the prevention or detection of crime
6) Data used for the apprehension or prosecution of offenders
7) Data used for the assessment or collection of tax or duty

A

Exemption to the data protection act section on personal data

46
Q

What do we mean by the person responsible for enforcing the Act. They also promote good practice and make everyone aware of the implications of the Act.?

A

Information Commissioner

47
Q

In which network policy are you likely to find the following content?

Have different levels of access (only certain people in a company can access sensitive data)

A

Acceptable Use Policy

48
Q

What happens when files are sent across the internet?

A

they are broken down into small packets of data.

49
Q

What is this?

Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.

A

One of the eight Data Protection Principles in the Data Protection Act 1998

50
Q

The Data Protection Act 1998 contains eight Data Protection Principles. What are they?

A

1) Personal data shall be processed fairly and lawfully.
2) Personal data shall be obtained only for one or more specified and lawful purposes, and shall not be further processed in any manner incompatible with that purpose or those purposes
3) Personal data shall be adequate, relevant and not excessive in relation to the purpose or purposes for which they are processed.
4) Personal data shall be accurate and, where necessary, kept up to date
5) Personal data processed for any purpose or purposes shall not be kept for longer than is necessary for that purpose or those purposes.
6) Personal data shall be processed in accordance with the rights of data subjects under this Act.
7) Appropriate technical and organizational measures shall be taken against unauthorized or unlawful processing of personal data and against accidental loss or destruction of, or damage to, personal data.
8) Personal data shall not be transferred to a country or territory outside the European Economic Area (EEA) unless that country or territory ensures an adequate level of protection for the rights and freedoms of data subjects in relation to the processing of personal data.

51
Q

Network security

What are these features of?

They may include rules / procedures such as:
Use complex passwords
Have different levels of access (only certain people in a company can access sensitive data)
Locking computers if the user leaves their desk
No installing of software and downloading files from the WWW
No use of USB sticks

A

Acceptable use policy

52
Q

What does a firewall do with the ports?

A

keep ports closed and open only those that they expect data to be sent to. For example, incoming emails are usually sent to port 110.

53
Q

What is this?

Personal data shall be accurate and, where necessary, kept up to date

A

One of the eight Data Protection Principles in the Data Protection Act 1998

54
Q

Network Policies

What are the four key aspects of a back up policy?

A
  • When
  • Where
  • What
  • How
55
Q

Anti-Spyware Software (Anti-Malware Software)

What does this describe?

It runs in the background recording every key you hit. If you type in the same set of characters, regularly, this could be identified as your password.

A

key logger

56
Q

Data Protection Act

What do we mean by

  • Data about an identifiable person
  • who is living
  • and is specific to that person.
  • Can include: date of birth, medical details, credit history, salary, qualifications, religious beliefs, etc.
A

Personal data

57
Q

Having ports closed protects the computer from hackers, plus its continual monitoring will help detect hacker activity.

What keeps the ports closed?

A

The firewall

58
Q

What are User Access levels?

A

This is where users of a computer system will be given different access rights depending on their role in the company.

59
Q

Data Protection Act

What do we mean by data about a living identifiable person, which is specific to that person

A

personal data

60
Q

Data Protection Act

What is the purpose of a Subject Access request?

A

Purpose is to let them check it is correct.

If information is wrong

61
Q

Why does a firewall keep ports closed?

A

Having ports closed protects the computer from hackers, plus its continual monitoring will help detect hacker activity.

62
Q

Data Protection Act

What do we mean by the living individual whom the personal information is about

A

data subject

63
Q

Data Protection Act

What do we mean by Notification by the data holder

A
  • The Information Commissioner needs to know that an organization is processing personal information.
  • Notification involves the data holder telling the Information Commissioner what personal data is processed and why it is processed.
64
Q

Anti-Spyware Software (Anti-Malware Software)

What is a key logger?

A

It runs in the background recording every key you hit. If you type in the same set of characters, regularly, this could be identified as your password.

65
Q

In which network policy are you likely to find the following content?

No use of USB sticks

A

Acceptable Use Policy