protecting data: tools and techniques Flashcards

1
Q

techniques to protecting data; file permissions and access levels

A
  • ensure access is restricted to those who need it
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

techniques to protecting data; protocols

A
  • define data transfer processes to ensure secure transfer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

techniques to protecting data; digital certificates

A
  • allow secure data transfer using public key encryption
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

techniques to protecting data; physical control

A
  • prevent unauthorised access using locks, biometrics etc
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

techniques to protecting data; passwords

A
  • limit access by ensuring users keep a secure password to access system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

techniques to protecting data; back up and recovery procedure

A
  • ensure that data can be recovered following any loss of data
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

tools for protecting data; antivirus software

A
  • detects and removes viruses and other malware from computer system
  • protects systems from forms of malware
  • but must be regularly updated as new viruses are created regularly
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

techniques to protecting data; firewalls

A
  • monitor network traffic into and out of an IT system and block suspicious traffic
  • they prevent hacking attempts
  • not 100% effective because security holes can be exploited
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

techniques to protecting data; encryption

A
  • conversion of data into unreadable code called cipertext
  • encrypted data cannot be read without encryption key
  • encryption keys must be maintained and kept secure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

encryption of stored and transmitted data

A
  • encrypt hard disk so anyone who gains access to our system cant read the stored data
  • encrypt data while being transmitted so if it is intercepted it can’t be read
How well did you know this?
1
Not at all
2
3
4
5
Perfectly