Risk to Data and Personal Information Flashcards

1
Q

Risks to data and information:

A
  • Unauthorised access
  • Damage by malware
  • Accidental deletion
  • Theft of personal data: phishing and pharming
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can unauthorized users access data?

A

Either directly or by using software that inputs multiple login details in order to attempt to gain access to networks with poor security.

Devices on a network can be targeted by unauthorized users to be used as botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How does malware work?

A

Malware shows messages, plays sounds, delete files or reprogram systems to perform tasks that’ll harm the system and the connected hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does ransomware work?

A

It threatens to delete a user’s files or restrict access to software or resources until the money is paid, usually to an anonymous account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Possible reasons for accidental deletion of files or contents of a drive:

A

Pressing a key on the keyboard

Formatting media on the wrong storage device

he device loses power unexpectedly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

It is the criminal activity of sending emails or SMS that appear to be from real organizations and asking users to type in their personal information by replying to the message or directing them through a hyperlink to a website into which the user is asked to type in their personal details

Spear phishing is customized and targeted at a small no. of particular users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is pharming?

A

The criminal activity to gain a user’s personal information and payment details by creating fake versions of trusted websites to trick users into entering their login details

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Methods by which users are directed to a pharming site:

A
  1. Internet traffic going to the real website is redirected to the fake website by altering the domain name servers (translates domain names to IP addresses) or by using malware to redirect web requests
  2. Designing the URL of the pharming website o be similar to that of the original website so if the user misspells the URL, they would go to the pharming website
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Methods to secure data and personal information online:

A
  • Firewalls (examine the network addresses and ports of the data)
  • Encryption
  • CAPTCHA tests
  • Passwords, pins, and biometrics
  • Anti-malware, anti-virus software
  • Access rights and file permissions
  • Secure websites
  • Not opening email attachments and web links
  • Backup procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Users should make sure their password is:

A
8 characters long
A mix of letters, numbers, and symbols
A mix of uppercase and lowercase letters
Made up of random characters
Frequently changed
Something that they haven't used before
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

CAPTCHA stands for:

A

Completely Automated Public Turing Test To Tell Computers and Humans Apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The function of the CAPTCHA test:

A

The CAPTCHA tests work by asking users to enter a randomly generated series of numbers or letters into a required field. Automated software cannot read the letters displayed so this is used to distinguish humans from bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How are the solutions of reCAPTCHA tests (pics share common features and extracts of texts from books) used?

A

They are used to digitize books and annotate images. This helps to make more books available online and improves the info. provided in online maps and online services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are viruses? How are they spread?

A

A virus is a malware that uses networks to spread to connected devices.

They are spread by communication software or by being loaded into the computer’s memory from external storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does anti-virus software work?

A

Anti-virus software constantly checks files that are downloaded by a computer for signs of virus definitions. If it finds a match, it quarantines the file so that it cannot run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The functions of adware and spyware:

A

Adware displays unwanted adverts

Spyware monitors and records computer data and user input. Example: keylogger

17
Q

How do anti-adware and ant-spyware software work?

A

They detect, quarantine, and remove adware/spyware

18
Q

How does HTTPS ensure security?

A

HTTPS authenticates payment servers and provides encryption using Secure Socket Layer and Transport Layer Security. It keeps communications private and provides security for user’s online accounts

19
Q

Precautions with email messages:

A
  • They don’t recognize the sender
  • The text is general or irrelevant to the user
  • The text contains spelling or grammatical errors
  • The attached file is an executable file
  • The text contains a message telling the user to do something immediately
  • The user doesn’t recognize the URL
20
Q

Where can backups be saved?

A
An external storage device 
Online storage (slower because it uses internet)
21
Q

Good backup procedures:

A
  • Set automatic backups
  • Don’t use optical media
  • Schedule backups fro late in the evening
  • Create more than one copy
  • Keep a copy of a folder containing important files backed up using online storage
  • Store copies at multiple locations
  • Store important data in a fireproof safe
22
Q

Types of backups:

A

Full backup

Differential backup

Incremental backup

23
Q

Examples of online payment systems:

A

Online third-party payment processors Eg. PayPal, Skrill

Bank cards

Contactless cards using NFC

24
Q

When paying online using bank cards, users must enter:`

A

Card number
Name on the card
Expiry date
3 or 4 digit card security code