ppe pt2 (nov) Flashcards

1
Q

What is the network security?

A

The protection of a network from external and internal threats such as viruses, hacker attacks, data interception and theft, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a security threat?

A

An incident - malicious or unintended - that causes disruption, damage or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a virus?

A

A piece of malicious code that attaches itself to a legitimate program and is activated when the ‘host’ program is on. It can cause severe damage to data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a hacker?

A

A seeker and exploiter of security vulnerabilities in code in order to gain unauthorised access to a computer system or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a ransomware attack?

A

An attack on a network in which data stored on a server is encrypted, making it unreadable. The victim must pay a ransom to get the data unlocked/back.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data integrity?

A

The reliability and trustworthiness of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define a DOS attack.

A

A Denial Of Service attack on a network that attempts to prevent legitimate users from access its services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define backup & recovery.

A

The process of making backup copies of data and storing them in a separate location to the live working environment (possibly in the cloud) so that they can be recovered in the event of data loss or damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ethical hacking.

A

This is also known as ‘good’ hacking. It is the act of looking for weaknesses in software and systems so that they can be addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is penetration testing?

A

‘Pen testing’ is the uncovering of vulnerabilities that could be exploited by a criminal by an ethical hacker (a.k.a. white-hat hackers).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is social engineering?

A

An attack that exploits how people behave and respond to certain situations in order to trick them into revealing personal information, usually used by an ethical hacker to test how easily tricked legitimate users of the network can be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of network security?

A

The goal o network security is to protect a network and its data from internal and external security threats such as incidents which cause disruption, damage or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

List the three important principles underpinning data security.

A
  • Confidentiality (to protect sensitive data)
  • Correctness (incorrect data is useless data)
  • Availability (networks can go offline by accident or on purpose. Successful backup & recovery is required)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Explain data integrity.

A
  • Data integrity is the reliability of data
  • It can be jeopardised intentionally or by accident
  • Data must be checked, secured and protected to maintain data integrity.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What can be used to prevent a DOS attack?

A

Effective backup and recovery procedures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who do ethical hackers typically work for?

A

They typically work on behalf of an organisation, carrying out simulated hacking attacks (e.g. pen testing) on its network to uncover any vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define access control.

A

Control of who can log into a network and determines what legitimate/authorised users can see and do on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is authentication?

A

The process of checking the identity of an individual attempting to gain access to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define multifactor authentication.

A

Provides an extra level of security. Users must provide a piece of knowledge, a physical artifact and a physical attribute.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the principle of least privilege?

A

Employees are only given the permissions and administrative rights they need to do their job.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define file permissions.

A

Control of the ability to view, change and execute files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is physical security?

A

Controlling access to critical parts of a network using physical method rather than software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define malware.

A

Standing for ‘malicious software’, it is software that has been designed to gain unauthorised access to a computer system in order to cause damage, disrupt its functioning or collect information without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is encryption?

A

A technique for keeping data secure by using a key to encode the data. Only someone with the key can decrypt it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Define firewall.

A

A network security system which inspects incoming and outgoing data traffic and uses a set of rules to decide which data to allow through from one side to the other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

List 3 criteria with examples that a user must provide to gain access to a network using multifactor authentication.

A
  • A piece of knowledge, e.g. ID, password or pin
  • A physical object, e.g. an identity pass
  • A physical attribute, e.g. a fingerprint or voice
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Give three examples of authentication.

A
  • Username and password
  • Algorithms and code
  • multifactor authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

List and explain four types of file permissions.

A
  • Read (users can view the content of a file, but not alter it)
  • Write (users can read and amend the content of a file)
  • Execute (users can execute the file)
  • Delete (users can delete a file)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Give three examples of firewall rules.

A
  • A rule which stops certain protocols from being used to prevent the organisation’s data from being potentially copied to an external sever
  • Block data coming/going to/from certain network addresses
  • Stop attempts at hacking the internal network’s servers by disallowing data that watches the pattern an attacker would use
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Give four suspicious activities that firewalls can block.

A
  • Downloading viruses while browsing online
  • Emailing sensitive data to themselves or to someone else outside the organisation
  • Visiting harmful or time-wasting websites
  • Downloading files from file sharing sites
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a digital device?

A

A smartphone, tablet, embedded system, e.g.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Define e-waste.

A

Any form of discarded electronic equipment, including digital devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is a precious metal?

A

A very rare, naturally occurring, metallic elements of high economic value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is a semiconductor?

A

Present in every piece of computing technology, it’s a substance (solid, element or compound) used to make computer chips. It can conduct electricity under some conditions but not others, making it a good medium for the control of an electrical current.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Define the replacement cycle.

A

The period of time between the purchase of assets (e.g. digital devices) and their replacement with equivalent assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is a carbon footprint?

A

The amount of CO2 an individual or organisation produces as a result of the energy they consume.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Define cloud computing.

A

The storing of software and data on a remote server accessed through the internet (e.g. microsoft office 365)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Explain why e-waste disposal represents a threat to the environment.

A
  • E-waste can include hazardous materials that can include toxic substances. They will leak out into the ground, contaminating water supplies, infiltrating the food chain and polluting the air.
  • Large amounts of e-waste are shipped overseas to developing countries, where it’s dumped into landfill sites or dismantled to extract the minerals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the main aim of the WEEE regulation?

A

The Waste Electrical and Electronic Equipment regulation’s main aim is to set targets for the collection, recycling and recovery of computing technology and other electronic devices. They apply to businesses, but not individual.

40
Q

What is the main aim of the ROHS directive?

A

The EU Restriction of Hazardous Substances directive was brought into the UK law in 2013, restricting the use of all 6 toxic materials typically used in manufacturing to force manufacturers of computing tech to replace them with safe materials.

41
Q

Explain why cloud computing can affect the environment.

A

Cloud computing and storage of vast amounts of data on remote servers has led to the building of data centres around the world. These store all images, tweets and selfies generated by social networking.

42
Q

Give 3 measures to make data centres more energy efficient.

A
  • Using hot-aisle/cold-aisle configuration to increase cooling system efficiency; using blanking panels to minimise recirculation of hot air and sealing the floor to prevent cooling losses
  • Investing in research to develop a new, less energy hungry alternative to silicon-based data storage.
  • Ration internet usage - possibly by imposing a tax on uploading data - and/or educate users so that they behave in a more environmentally responsible fashion
43
Q

Describe two environmental issues associated with the manufacture of digital devices.

A
  • The production of digital devices has many environmental issues associated with it. The extraction of raw materials from the ground, which are used in the production of digital devices, can lead to intense damage to the local environment, including scarring of the landscape and contamination of ground soil and water supplies.
  • Once the raw materials have been extracted, the shipping of the materials also has an environmental impact. The transportation to manufacturers uses fossil fuels, such as oil and coal. This contributes further to global warming.
44
Q

State 2 ways in which governments are attempting to control the environmental impact of digital device manufacture.

A

The RoHS directive became UK law in 2013. Tougher recycling targets are set by governments to collect more reusable materials from computing technology when they are disposed of. Recycling sites are being upgraded to take a wide range of materials, including appliances and smaller digital devices.

45
Q

Explain how having a short replacement cycle for digital devices is harmful to the environment.

A
  • It results in an increase in demand, production and disposal over a shorter period of time.
  • An increase in manufacture leads to more extraction of raw materials, transportation of goods and energy usage in factories.
  • These increases, lead to further burning of fossil fuels that contribute to global warming. Once a device is finished with, it’s likely to end up at a landfill, contributing to increasing amounts of e-waste already in the world.
46
Q

List ways computing technology harms the environment.

A
  • The development of a device requires raw materials to be extracted from the ground, including sand, oil and metals of various types (including precious metals like gold, silver and copper).
  • This extraction can scar the landscape of the area and contaminate soil and local water supplies.
  • Transportation of raw materials and manufacturing of devices contribute to CO2 emissions through the burning of fossil fuels.
  • Further transportation needed to distribute devices to supplies and consumers.
  • At the end of a device’s life, it’s often disposed of in landfill if not recycled or reused, shortening the length of the replacement cycle.
47
Q

What is personal data?

A

Any information relating to an identified or identifiable living person, including name, age, gender and location.

48
Q

Define identity theft.

A

The stealing of another person’s personal details, such as their bank account details or passport number. It’s usually done to commit identity fraud.

49
Q

Data protection laws in the UK is based on which directive?

A

The General Data Protection Regulation containing 99 articles setting out the rights of individuals and the obligations of organisations who collect, process and store data.

50
Q

Define data subject.

A

A person who has their data is being collected and processed.

51
Q

What is a data breach?

A

A breach of security leading to the accidental or unlawful destruction, loss, alteration, unauthorised disclosure of or access to personal data.

52
Q

Describe ethics.

A

Ethics is about good practice and behaving in a morally correct way.

53
Q

List 4 legal responsibilities of data holders.

A
  • The data must be processed in a fair, lawful and transparent manner.
  • The data should be accurate and up-to-date.
  • The data must not be kept longer than necessary.
  • The data subjects must give their consent - they must be asked to ‘opt-in’ or ‘opt-out’
54
Q

List 4 legal rights of data subjects.

A
  • They must be informed about the collection and use of this data
  • They have the right to have their data erased
  • They have the right to restrict or stop the processing of their data
  • They have the right of data portability, meaning they can move, copy or transfer the data
55
Q

List and explain 3 types of offences in the Computer Misuse Act 1990.

A
  • Unauthorised access to computer material; using a computer to attempt ot access a program or data to which you know you are not authorised. The attempt itself is an offence, successful or not.
  • Unauthorised access with intent to commit further offences; to attempt to access a computer system with the intention of committing a further offence.
  • Intentional and unauthorised destruction of software or data; to gain unauthorised access to a computer with the intention to change the data or impair the running of the computer.
56
Q

Define robotics.

A

The design, construction, operation and use of robots.

57
Q

What is AI?

A

Artificial intelligence. They’re machines and their programs that solve problems commonly associated with human intelligence, e.g. learning, problem-solving and pattern recognition.

58
Q

What are LAWS?

A

Lethal Autonomous Weapons. They can search for and engage targets on their own, making their own decisions with direct human control.

59
Q

Define machine learning and give an example of where it’s used.

A
  • Machine learning is the branch of AI that allows them to learn independently. It’s used by music and video streaming services to make recommendations.
60
Q

Give an ethical concern associated with the use of surveillance cameras.

A

Surveillance cameras can use face recognition to identify individuals. There’s an ethical concern in this, as personal data is being collected without express permission of those being captured.

61
Q

What does the Data Protection Act (2018) expect organisations to do to verify consent?

A
  • The act expects organisations to allow users to say no to their data being used.
  • The organisation must be specific about what data processing activities are being carried out.
  • In addition, the user must know the identity of the organisation and have the option to withdraw consent any time.
62
Q

What is algorithmic bias?

A

Bias in computer systems that create unfair outcomes, e.g. in sleecting candidates for a job using AI that has preprogrammed bias by the devlopers or the data.

63
Q

How can algorithmic bias be introduced?

A

Through pre-existing bias in data or by the programmers themselves.

64
Q

List 4 types of protection against cyberattacks.

A

Antimalware, encryption, acceptable use policies and backup and recovery policies/procedures.

65
Q

Define signatures.

A

Signatures are known malware definitions (set of unique data or bits of code) allowing it to be identified.

66
Q

What is heuristics?

A

Heuristics identifies malware by behaviour and characterisation instead of comparing against a known list of malware. It’s a set of rules used to detect malicious behaviour without having to uniquely identify the program responsible or it.

67
Q

Give 3 heuristics rules.

A
  • A program which tries to copy itself into other programs
  • A program which tries to write directly on the disk
  • A program which decrypts itself when run (malware often does this to hide itself from the signatures known).
68
Q

What is encryption?

A

It scrambles any data into an unreadable form to anyone who doesn’t have the key to turn it back it unto its unscrambled form. This is useful for when we send sensitive information, so it can’t be understood. There are 2 types; asymmetric and symmetric.

69
Q

Explain asymmetric encryption.

A

Asymmetric encryption encrypts and decrypts data using 2 different keys; a public key and a private key. Every user has both. A message encrypted with a specific public key can only be decrypted by the corresponding private key.

70
Q

Explain symmetric encryption.

A

Algorithms encrypt and decrypt a message using the same key. Both ends of the transmission must know the exact same shared key.

71
Q

Why does antimalware need to be regularly updated?

A
  • New malware may’ve been created and distributed
  • This means the out-of-date anti-malware won’t have the signature of the new malware in its database.
  • Therefore, the infection goes unidentified and the antimalware fails to protect the computer.
72
Q

Define plain text.

A

The readable content before it’s encrypted or once it has been decrypted. Cipher text is encrypted plain text.

73
Q

What does an acceptable use policy need?

A
  • Rules that ensure all laws are complied with.
  • Rules that ensure malicious software isn’t installed.
  • Rules that ensure files aren’t downloaded from the internet.
74
Q

What is an acceptable use policy?

A

A set of conditions or rules that a network user must agree to comply with before they’re allowed to use the network.

75
Q

Define a backup network policy.

A

A policy which ensures the copying of programs and data stored on the network to safeguard them in case of natural or man-made disasters.

76
Q

What could a backup network policy have?

A
  • Who’s responsible for the backup process
  • When the backup is to be made
  • Where the backups will be kept
  • How long the backups will be kept
77
Q

Define a recovery policy.

A

A set of procedures that the organisation will follow to restore normal system operations if there’s a natural disaster or a man-made one.

78
Q

What could a recovery policy include?

A
  • How often it should be tested
  • A statement of where all the data backups are kept
  • A description of where all data backups are kept
  • A description of which data should be restores and in which order it should be restored in.
79
Q

State two ways that anti-malware software may identify an infection.

A
  • Using a database of malware definitions (using signatures)
  • Heuristics (define heuristics (Identifies malware by behaviours and characteristics, instead of comparing against a list of known malware))
80
Q

Why should users always apply patches to their software?

A

They correct errors in the program or vulnerabilities in the security of the software application.

81
Q

Describe the role of a signature file in anti-malware software.

A

A signature file is used to identify known malware. Periodically, the program will check online to see if there is a signature file newer than the one currently installed on a machine. If there is a new file, then it’ll be downloaded and updated.

82
Q

Give two reasons why an employee must not attach one of their own portable devices to the network.

A
  • The device may contain malware of some kind that could be transmitted to the network.
  • If the device does contain malware of some kind, it’d jeopardise the security of the network, potentially harming other users and the network itself.
83
Q

What is a worm?

A

A malware that doesn’t need a user to distribute it.

84
Q

What is a virus?

A

The malware that embeds itself into other programs or files.

85
Q

What is a trojan?

A

Malware that must be installed by the user and is hides itself as authentic software.

86
Q

What is a phishing attack?

A

Attacks which spread via apparently legitimate email communication, but actually extracts sensitive or confidential information from the user.

87
Q

What is a subprogram?

A

A self-contained block of code which performs a specific/dedicated task.

88
Q

State 3 types of errors in programs.

A
  • Runtime
  • Syntax
  • Logic
89
Q

How can a user increase the useful life of a smartphone rather than throwing it away?

A
  • Repairing it
  • Give away to charity
  • Keep the software updated
90
Q

Give one way a patent protects intellectual property.

A
  • It prevents someone from selling an invention because it gives the inventor the exclusive right to sell it for 20 years.
91
Q

Describe two ways an operating system manages processes.

A
  • The OS extends main memory by using a part of secondary storage as virtual memory.
  • The OS also uses a scheduling program to share processing time between competing processes.
92
Q

Define decomposition in terms of computational thinking.

A

Breaking down a problem.

93
Q

State the worst case for a linear search algorithm.

A

The target item is not on the list or is at the end of the list.

94
Q

What is bubble sorting?

A
95
Q

What is the component of an algorithm to store whether a swap has been made during a pass.

A

A variable.

96
Q

Define iteration.

A

Looping every item in a data structure.

97
Q

Give one benefit of using subprograms.

A

The subprograms may be used more than once in a program so that writing, debugging, testing will save time.