Protecting data and its importance Flashcards

1
Q

what are the 2 ways data can be lost

A

accidentally or by theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are 5 ways data can be accidentally lost

A

1.hardware failures
2. natural disasters
3. misplaced equipment
4. failed backups
5. human error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what are 5 ways data can be lost due to theft

A
  1. hacking
  2. social engineering
  3. physical theft
  4. disgruntled employee disclosing data
  5. data interception
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what are 2 moral implications of losing data

A

lose their advantage to competitors as their ideas can be stolen
open to backmail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is a legal implication of losing data

A

breach of GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are 3 financial implications of losing data

A

loss of revenue
loss of reputation
fines and compensation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is an acceptable use policy

A

a set of rules that tell users how to use the network properly and safely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is staff training and how does if affect data protection

A

the expectation on staff is to be more responsible when using data and a big part of this is to train staff to be aware of external threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what are the 2 phases in a recovery plan

A

before phase
during phase

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a disaster recovery plan

A

a document that outlines how an organisation responds to a cyber attack, natural disaster or power cuts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what happens in before phase

A

putting measure in place to prepare for disaster such as taking backups in another location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the during phase

A

hot to respond during the disaster, for example a backup generator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is confidential computing

A

an emerging technology that is used to store data more securely

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what are the 3 steps to confidential computing and what happens in each step

A

protection at rest - encrypt data before storing it
protection in transmit - use end-to-end encryption to secure communications
-protection in use - encrypt data while it is being used in RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly