Security 2 Flashcards

1
Q

Name the 6 laws Name the 6 laws

A

1) Privacy Act (commonwealth) 1988
2) information privacy act (Vic) 2000
3) Health records act 2001
4) Victorian charter of human rights and responsibilities 2006
5) spam act 2003
6) copyright act 1968

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Name the three types of threats

A

Accidental, deliberate or event based threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Examples of accidental threats

A
  • Incompetent employees
  • “Misplaced” data
  • Natural disasters
  • User error
  • Failure to maintain file-management procedures
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Examples of deliberate threats

A
  • Viruses- Trojan horse
  • Spyware
  • Adware
  • Spam
  • Phishing
  • Hacking
  • Tampering with files
  • Theft of hardware
  • Disgruntled employees
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Examples of event based threats

A
  • Power surge
  • Hardware failure
  • Operating system or software failure
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examples of software security measures

A
  • Usernames, login, and passwords
  • Firewalls
  • Encryption
  • Antivirus software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a disaster recovery plan?

A

It tells you what to do when a disaster strikes. It is a written plan/document that tells an organisation what steps are needed to restore the company operations in the event of a disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the stages of the DDRP?

A
  • Emergency plan
  • Backup plan
  • Recovery plan
  • Test plan
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Why do you need to make all of the plans?

A

To be prepared in the case of a scenario,
to test them all and
to know that they will work.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advantages of cloud computing

A
  • Less effort is needed
  • Save on energy bills
  • Businesses require less storage hardware
  • Decreases the amount of software licensing and software installation needed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disadvantages of cloud computing

A
  • Security of the data is only as good as security in the plan
  • Risk of losing internet connectivity
  • You need a stable internet connection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Things for evaluation criteria and the effectiveness of information management strategies

A
  • Integrity of data
  • Security
  • Ease of retrieval
  • Currency of issues
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe data integrity

A

refers to whether data is ‘trustworthy’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe security

A

Is the data safe from unauthorised access or alteration?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Describe easy of retrieval

A
  • Files should be easy to retrieve and quickly found
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe currency of issues

A
  • Regular backups will ensure that the most recent versions of files are available if needed
17
Q

What are security procedures

A
  • Storage
  • Backups
  • Disposal
  • Archiving
18
Q

Describe storage

A

File naming conventions, storing data in a correct manner.

19
Q

Describe archiving

A

Process of copying files to long-term storage, then deleting them from the first hard drive

20
Q

Describe disposal

A

Disposing of unwanted equipment. Need to archive or destruct of data first.

21
Q

Examples of personal information

A

Characteristics used to identify someone

  • Name
  • Address
  • Age
  • Gender
22
Q

Examples of sensitive information

A

Legally don’t have to answer

  • Racial origin
  • Political opinions
  • Sexual preference
  • Criminal record
23
Q

Examples of health information

A
  • Medical history
  • Current medical condition
  • Dental records
  • Donations of body parts
24
Q

Describe the privacy act (commonwealth).

A
  • 1988
  • It covers private organisations who earn more than $3 million per year
  • It outlines the handling of the collection, use and disclosure, storage and disposal of personal information by both electronic and manual or conventional forms of data gathering.