Section 6 Flashcards

1
Q

Define ‘logical prevention methods’

A

This is a computer-based method of protecting data which is normally implementing using software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name 4 logical prevention methods (there are 6 altogether):

A

Password protection
Firewalls
Authentication
Encryption
Access Levels
Anti-Malware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is password protection?

A

• A string of characters that should only be known to the user.
• Strong passwords are advised (numbers, letters, symbols)
• Users are the biggest security danger (because they share passwords, write them down, don’t change them often etc.).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a firewall?

A

• Software that monitors the data packets that enter and leave the network/ computer.
• A firewall is usually built into a computer’s operating system, but dedicated firewall software and hardware can be used.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Authentication?

A

• Methods used to verify the identity of the user and prove that they’re the account holder.
• Methods include CAPTCHA, two-factor authentication (2FA), one-time passcode (OTP).
•Apps from some organisations, such as banks, use this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is encryption? How does it work?

A

• The use of an algorithm to scramble data so it becomes unreadable.
• Data (plain text) is encrypted using an ENCRYPTION Key becoming cypher text. Data is sent across a network and decrypted the other side using a DECRYPTION Key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are Access Levels?

A

Network administrators can allocate accounts to user which allow them to access specific files and folders. For example, a student account at a school wouldn’t have the same level of privileges as an administrator account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Anti-Malware Software?

A

• Software that detects malware which can then be quarantined or deleted.
• New viruses are created all the time, so it is essential that software is updated regularly to ensure that it continues to work effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ‘physical prevention methods’.

A

This involves tangible ways of keeping data secure and safe.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name 4 physical prevention methods (there are 6 altogether):

A

Locks
CCTV
Backup systems
Biometrics
Security Staff
Location of Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are locks?

A

• Locks can be used on doors to computer rooms and server rooms to stop people breaking in and stealing equipment.
• It is also important to lock the room where backups are kept.
• Locks can be unlocked by traditional keys, or opened by codes, key cards, tags, or biometric data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is CCTV?

A

• Cameras inside and outside the rooms can be used to monitor activity 24/7.
• The quality of the image on CCTV can be a factor; using HD monitors and cameras can improve this.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are backup systems?

A

• Data can be backed up away from the main location. This could be another site or cloud based.
• If the computers are damaged, the data will still be safe. Even if data is backed up, it is still a disruption to retrieve them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are biometrics?

A

• A scanner can be used to gain access to locked rooms.
• Methods used for access could be facial recognition, iris recognition, and thumb prints.
• It is very useful as the user does not have to carry a key or ID card, and the ID details cannot be passed on to someone else.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are security staff?

A

• Security staff could be used to protect computer systems that may contain sensitive data.
• This is an expensive method of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Location of Hardware?

A

• Hardware should be stored in a safe location so it cannot be affected by natural disasters.
• It is also sensible to keep computers in a room that does not have large expanses of windows.
• The room should be cool and well ventilated to avoid overheating.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a security policy?
Tiawdtidtpiaofst

A

This is a written document that is designed to protect individuals and organisations from security threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Name the three types of policies:

A

Acceptable Use Policy
Staff training/ responsibilities
Disaster recovery plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe an Acceptable Use Policy.

A

A set of rules that tells users how to use the network.
Your school will have their own acceptable use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe Staff training/ responsibilities.

A

The expectation on staff is to be more responsible when using data and a big part of this is to train staff to become aware of external threats and how best to manage these.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Describe a disaster recovery plan.

A

A document that outlines how an organisation responds to a cyber-attack, natural disasters or power-cuts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 2 phases in a disaster recovery plan? Describe them.

A

Before phase - Putting measures in place in preparation for a disaster. This could be backing up data in another location.
During phase - How to respond if and when a disaster takes place. For example, a backup generator if there is a power cut.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is confidential computing?

A

• Confidential computing is an emerging technology used for storing data more securely.
• It’s a cloud computing technology that isolates sensitive data in a protected hardware-based environment (such as the devices we use).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How does confidential computing work?

A

• Protection of data at rest - encrypting it before storing it in the device itself.
• Protection of data in transit - use of end-to-end encryption.
• Protection in use - encrypting data while being used by RAM or CPU.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Why use confidential computing? Give 2 ideas.

A

• To protect sensitive data, even while in use - and to extend cloud computing benefits to sensitive workloads.
• To protect intellectual property.
• To protect data processed at the edge (Edge computing)
• To eliminate concerns when choosing cloud providers.

26
Q

Define ‘Ethics’.

A

Rules of conduct in a particular culture or group recognised by an external source or social system. For example, a medical code of ethics that medical professionals must follow.

27
Q

Define ‘Morals’.

A

Principles or habits relating to right or wrong conduct, based on an individual’s own compass of right and wrong.

28
Q

Name 2 ethical issues to consider (there are 4 altogether):

A

Privacy and security
Monitoring of individuals
Impact of data loss or damage
Cookies

29
Q

ETHICAL ISSUES TO CONSIDER… Privacy and security

A

Privacy and Security - the storage of data by organisations who are legally bound to keep it secure.

30
Q

ETHICAL ISSUES TO CONSIDER - Monitoring of individuals

A

Monitoring of Individuals - the use of software to monitor employees and what they do or the use of facial recognition cameras.

31
Q

ETHICAL ISSUES TO CONSIDER - Impact of data loss or damage

A

Impact of data loss or damage - the impact this has on the organisation’s reputation or individuals’ sales/ revenue.

32
Q

ETHICAL ISSUES TO CONSIDER - Cookies

A

Cookies - small text files designed to remember information such as certain items that are in your checkout.

33
Q

Name 2 monitoring threats (there are 4 altogether):

A

Social Networking Sites
Search engines
Cookies
Geotagging

34
Q

MONITORING THREATS - Social Networking Sites

A

They will keep track of interaction that takes place.

35
Q

MONITORING THREATS - Search engines

A

They record information about your searches such as IP address, time spent searching, search queries made

36
Q

MONITORING THREATS - Cookies

A

Small text files stored on your computer, and they can store your browsing habits and websites you regularly visit.

37
Q

MONITORING THREATS - Geotagging

A

People may post photos online, such as social media and link names or other information with the photo.

38
Q

What is The Data Protection Act?

A

The Data Protection Act 1998 sets out to protect the privacy of personal information.
It only covers personal information about living individuals, not about businesses. It is run by the Information Commissioner’s office.

39
Q

Define ‘Data Subjects’:

A

People who have data held about them (just about everybody really).

40
Q

Define ‘Data Users’:

A

The people or organisations who hold the data (there are far more data users than many people think).

41
Q

Define ‘Data Controller’:

A

An organisation holding data (data users) has to have a data controller - a person who makes sure the act is followed.

42
Q

What is the mnemonic used to remember the 8 Principles of the Data Protection Act?

A

SLURPOAF

43
Q

What are the 8 Principles of the Data Protection Act?
SLURPOAF

A

• Must be kept Secure
Let subjects see the data stored on them.
• Must be kept Up-to-date
• Should be Relevant
• Used for intended Purpose
Obtained lawfully
Accurate
• Should not be kept For longer than necessary.

44
Q

There are 6 Rights of the Data Subject.

Name 3 of them.

A

See what data is being held about them if they ask the data user. They may have to pay to see it.
Change anything that is wrong
Refuse to have some data stored at all, if it might cause damage or distress.
Refuse to allow processing for direct marketing - junk mail
Complain to the Data Protection Commission if they think the rules have been broken.
Claim compensation if they can prove they have been cause damage by a data controller breaking the rules.

45
Q

There are 3 exemptions to the Data Protection Act.
Name 2.

A

National security - you cannot demand to see your data if national security is at stake.
Police Investigations - information being used to prevent crime is not covered (though police records are).
Examination results are exempt until they are published by the examining bodies.

46
Q

Name 4 of the 7 main principles of the GCPR:

A

• Accountability
• Lawfulness, fairness, and transparency
• Purpose limitation
• Data Minimisation
• Accuracy
•,Storage limitation
• Integrity and confidentiality (security)

47
Q

What is The Computer Misuse Act?

A

The Computer Misuse Act (1990) was developed to cope with the problems of computer hackers and viruses.

48
Q

What are two of the three principles of the computer misuse act?

A

• It is illegal to access unauthorised data eg. Hacking
• It is illegal to access unauthorised data with the intent to commit a crime.
• It is illegal to access unauthorised data and change it e.g. Planting viruses and deleting files.

49
Q

What does RIPA stand for?

A

The Regulation of Investigatory Powers Act

50
Q

What does The Regulation of Investigatory Powers Act (RIPA) allow?

A

• It allows authorised people to carry out surveillance or data investigations upon individuals or businesses.
• It makes it illegal for unauthorised people to do this.

51
Q

What two main areas does the Regulation of Power Act cover?

A

Detection and prevention of terrorism.
Prevention and detection of crime.

52
Q

Give 2 issues with The Regulation of Powers Act:

A

• Many people believe this is an invasion of privacy - especially when being falsely accused.
• Many businesses monitor people at work - invasion of privacy?
• Many people are encrypting communications making it very difficult to monitor!

53
Q

What is The Electronic Communications Act?

A

• When the government realised that internet communications were growing in 2000, they wanted to ensure people trusted e-communications and online sales.
• They introduced this law to ensure that companies and people can have legal support when trading online. It ensures that encryption is carried out with credit card details and it makes digital signatures legally binding like a normal hand signature.

54
Q

Name 2 issues with The Electronic Communications Act: (think signatures)

A

• Not many people know what a digital signature is or how to get one.
• Not many people know how to actually use a digital signature.
• Most people still do not 100% fully trust the internet and prefer a handwritten signature and documents in important situations (eg. buying a house, car etc.).

55
Q

Give the three main concerns of using a computer regularly:

A

Eye strain
Repetitive Strain Injury (RSI)
Back ache

56
Q

Give 3 symptoms of eye strain and their solutions:

A

Burning or itching eyes - use monitors which don’t flicker.
Blurring or double vision - Have blinds at the windows so that the sun doesn’t shine directly on the screen.
Headache - Use suitable lights that disperse evenly and don’t shine on the screen.
Nausea - Use a screen filter
Fatigue - Keep your eyes at least 18 inches from the screen and regularly look away from the screen and focus on something in the distance.

57
Q

What is RSI?

A

Repetitive Strain Injury (RSI) is damage to the fingers, wrists, and other parts of the body due to repeated movements over a long period of time.

58
Q

Give two symptoms of RSI and their solutions:

A

Aching
Pain in arms/ wrists even after rest
Weakness/ swing/ tenderness

Regular breaks
Wrist supports

59
Q

What is Back ache?

A

Many computer users suffer serious back problems. This is probably due to poor posture or an awkward position while sitting at a computer.

60
Q

Give 3 solutions to back ache:

A

Fully adjustable chairs
Footrests
Regular breaks
Adjustable monitor
Don’t slouch

61
Q

Name 6 employer regulations (The Law)

A

Provide tillable screens
Provide foot supports
Provide anti-glare screen filters
Make sure lighting is suitable
Provide adjustable chairs
Pay for appropriate eyesight tests