SAFTEY AND SECURITY OF ICT SYSTEM AND PROCEDURES FOR BACKUP AND RECOVERY Flashcards

1
Q

WHY DO YOU NEE TO PROTECT DATA IN ICT SYSTEM

A

DATA IS INVALUABLE TO A COMPANY AND IF IT WAS LOST THE COMPANY WOULD BE CRIPPLED IN THE SHORT TERM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

WHAT ARE THE THREATS TO ICT SYSTEM

A

CARELESSNESS-A VAST AMOUNT OF DATA IS LOSS DUE TO CARELESSNESS FROM STAFF E.G NOT SAVING WORK AND DELETING A FILE BY ACCIDENT
HUMAN ERROR-FIRE AND FLOOD THEFT OF EQUIPMENT
VIRUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

REASON FOR SECURITY BREACH

A

PERSONAL GAIN-A STUDENT MIGHT CHANGE THEIR GRADE TO GET INTO UNI
FINANCIAL GAIN-SOMEONE MIGHT HACK THE BANK AND TRANSFER THE MONEY TO THEIR ACCOUNT
SABOTAGE-TO DAMAGE THE REPUTATION OF A COMPETITOR ORGANISATION

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TYPE OF THREAT

A

DATA ACCESS THREATS MEAN DATA IS ACCESSED WHILE BEING COMMUNICATED ACROSS A NETWORK ILLEGALLY AND IS CHANGED BY SOME ONE WHO DON’T HAVE ACCESS

SERVICE THREATS ARE DESIGNED TO STOP THE DATA BEING USED BY THE ORGANISATION IT BELONGS TO BY DISRUPTING THE NORMAL TUNING OF THE SOFTWARE BEGIN USED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

MEANS OF CONTROL OF THREATS

A

DATA ENCRYPTION-ONE WAY IS BY ENCRYPTING THE MESSAGE BY SCRAMBLING THE DATA SO IT CANNOT BE UNDERSTOOD IF INTERCEPTED

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HOW ARE ICT SYSTEM PROTECTED

A

HARDWARE MEASURE
SOFTWARE MEASURE
PROCEDURES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

EXPLAIN HARDWARE

A

USE THINGS LIKE BIOMETRIC TO CONVERT A HUMAN CHARACTERISTICS SUCH AS FINGERPRINT INTO A DIGITAL FORM THAT CAN BE STORED IN A COMPUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

EXPLAIN SOFTWARE

A

MAKE PRIVILEGE FOR EACH USER.TELLS THEM WHAT COMPUTER AND WHAT DATA THEY ARE ALLOWED TO ACCESS AND WHAT THEY ARE ALOUD TO DO WITH THE DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

EXPLAIN PROCEDURES

A

THESE ARE A SET OF RULES TO MAKE SURE THE DATA CANNOT BE COMPROMISED BY ERROR E.G VALIDATION CHECK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

WHAT IS THE DATA PROTECTION ACT 1998

A

REGULATES HOW PERSONAL DATA IS USED AND PROTECT DATA SUBJECT FROM THE MISUSE OF THEIR PERSONAL DATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WHAT IS THE COMPUTER MISUSE ACT

A

THIS BECAME A LAW IN 1990.UNDER THE LAW ANY ACT OF UNAUTHORIZED ENTRY TO ICT SYSTEM AND THE INTRODUCTION OF VIRUS ARE MADE A CRIMINAL ACT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

BACKUP STRATEGIES

A
ANY PERSON OR ORGANISATION THAT STORES DATA NEEDS TO HAVE A BACKUP STRATEGIES IN PLACE.THIS DEPENDS ON
WHAT DATA NEEDS TO BE BACKED UP
HOW OFTEN IT NEED TO BE BACK UP
WHEN DOES IT NEED TO BE BACKUP
WHERE WILL THE DATA BE STORED
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

WHAT IS FULL BACKUP

A

ALL THE DATA STORED IN YOUR FILES AND FOLDERS WILL BE SAVED.THIS MEANS THAT THEY CAN BE RESTORED QUICKLY IF SOMETHING GOES WRONG.A FULL BACKUP TAKES A LONG TIME.THIS IS WHY ITS DONE ON THE WEEKENDS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

WHAT IS DIFFERENTIAL BACKUP

A

ONLY THE DATA THAT IS DIFFERENT SINCE THE LAST FULL BACK UP WILL BE SAVED.THIS REDUCES THE TIME TO RESTORE THE DATA BECAUSE IT ONLY USES THE PREVIOUS FULL AND DIFFERENTIAL BACKUPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WHAT IS INCREMENTAL BACKUP

A

THIS SAVES ALL THE FILES THAT HAVE CHANGED SINCE THE LAST BACKUP.WEATHEVER THAT WAS A FULL OR DIFFERENTIAL BACKUP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TYPES OF STORAGE MEDIUM IN BACKUP

A

MAGNETIC
OPTICAL
HARD DISK

17
Q

RECOVERY PROCEDURES

A

ORGANISATION NEED RECOVERY PROCEDURES.THIS INCLUDES
ALTERNATIVE ACCOMMODATION
AVAILABILITY OF STEP TO HELP RECOVERY PROCESS
TRAINING