Protecting Data and Information Flashcards

1
Q

Access Levels

A

Different levels of permissions that determine the actions a user can perform within a system or on specific data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Rights

A

Permissions granted to users, specifying what actions they can perform on a computer system or specific files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Accidental Damage

A

Unintentional harm or destruction to computer hardware, software, or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accidental Loss

A

Unintended misplacement or deletion of data or files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Anti-Virus Software

A

Programs designed to detect, prevent, and remove computer viruses and other malicious software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Backup and Recovery Procedures

A

Plans and processes for regularly saving and restoring data to prevent loss in case of system failure or data corruption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CAPTCHA

A

A security feature that requires users to complete a task to prove they are human and not a computer program.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Chip & PIN

A

A security feature for credit and debit cards that requires users to input a personal identification number (PIN) along with a chip in the card.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Contactless

A

A technology that enables transactions or data exchange by bringing devices close together without physical contact.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cracking

A

Unauthorized attempts to bypass security measures, often associated with attempting to obtain passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data Controller

A

An entity or individual responsible for determining the purposes and means of processing personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Data Integrity

A

The accuracy, consistency, and reliability of data throughout its lifecycle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Data Security

A

Measures taken to protect data from unauthorized access, alteration, or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Data Subject

A

An individual to whom personal data relates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Data User

A

An entity or individual that uses or processes data, often subject to data protection regulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Denial of Service Attack

A

An attempt to make a computer or network unavailable to its intended users by overwhelming it with traffic or requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Digital Certificate

A

A digital document that verifies the identity of a website or individual and facilitates secure communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Disaster Recovery Plan

A

Procedures and strategies to recover and resume operations in the event of a catastrophic event or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Encryption

A

The process of converting information into a code to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

File Permissions

A

Settings that determine who can access or modify files on a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Firewall

A

A security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

22
Q

Format Check

A

Verifying that data is in the correct format, preventing errors or inconsistencies.

23
Q

General Data Protection Regulation (GDPR)

A

A set of regulations designed to protect the privacy and personal data of individuals in the European Union.

24
Q

Hacking

A

Unauthorized access, manipulation, or exploitation of computer systems or networks.

25
Q

Hashing

A

Converting data into a fixed-size string of characters, often used for data verification and security purposes.

26
Q

Identity Fraud

A

Unauthorized use of someone else’s personal information for fraudulent purposes.

27
Q

Information Commissioner’s Office (ICO)

A

The UK’s independent authority that upholds information rights and promotes data privacy.

28
Q

Internet Bot

A

Automated software designed to perform tasks on the internet, both legitimate and malicious.

29
Q

Length Check

A

Verifying that data meets specified length requirements, preventing errors or inconsistencies.

30
Q

MAC Address

A

Media Access Control address, a unique identifier assigned to a network interface for communication.

31
Q

Malware

A

Malicious software designed to harm or exploit computer systems or data.

32
Q

Man in the Middle Attack

A

A security breach where an attacker intercepts and possibly alters the communication between two parties.

33
Q

Name Generator Attack

A

A type of cyber attack that exploits automated processes using randomly generated names.

34
Q

Passwords

A

Secret combinations of characters used to access computer systems or accounts.

35
Q

Phishing

A

Attempting to deceive individuals into revealing sensitive information by pretending to be a trustworthy entity.

36
Q

Physical Access Control

A

Measures to restrict physical access to computer systems or data storage areas.

37
Q

Port

A

A communication endpoint in a computer network, allowing data to be sent and received.

38
Q

Presence Check

A

Verifying that required data or fields are filled or present.

39
Q

Private Key Encryption

A

Encryption method that uses a private key to encrypt and decrypt data, ensuring secure communication.

40
Q

Protocol

A

A set of rules governing how data is transmitted between devices in a network.

41
Q

Public Key Encryption

A

Encryption method that uses a pair of public and private keys for secure communication.

42
Q

Quarantine

A

Isolating or containing potentially harmful files or software to prevent them from causing harm.

43
Q

Range Check

A

Verifying that data falls within specified numerical ranges, preventing errors or inconsistencies.

44
Q

Ransomware

A

Malicious software that encrypts a user’s files and demands payment for their release.

45
Q

Real-Time Scanning

A

Continuous scanning for viruses or malware as files are accessed or modified in real-time.

46
Q

Shouldering

A

Unauthorized individuals observing or obtaining sensitive information by looking over someone’s shoulder.

47
Q

Spyware

A

Software designed to secretly collect information about a user’s activities without their knowledge.

48
Q

Trojan

A

Malicious software disguised as legitimate software to deceive users into unknowingly installing it.

49
Q

Type Check

A

Verifying that data is of the expected type, preventing errors or inconsistencies.

50
Q

Virus Definition

A

A database of known virus characteristics used by antivirus software to detect and remove threats.

51
Q

Viruses

A

Self-replicating and harmful software that infects other programs and can cause damage to computer systems.

52
Q

Worm

A

A type of self-replicating malware that spreads across computer networks without user interaction.