Security 2 Flashcards
Name the 6 laws Name the 6 laws
1) Privacy Act (commonwealth) 1988
2) information privacy act (Vic) 2000
3) Health records act 2001
4) Victorian charter of human rights and responsibilities 2006
5) spam act 2003
6) copyright act 1968
Name the three types of threats
Accidental, deliberate or event based threats
Examples of accidental threats
- Incompetent employees
- “Misplaced” data
- Natural disasters
- User error
- Failure to maintain file-management procedures
Examples of deliberate threats
- Viruses- Trojan horse
- Spyware
- Adware
- Spam
- Phishing
- Hacking
- Tampering with files
- Theft of hardware
- Disgruntled employees
Examples of event based threats
- Power surge
- Hardware failure
- Operating system or software failure
Examples of software security measures
- Usernames, login, and passwords
- Firewalls
- Encryption
- Antivirus software
What is a disaster recovery plan?
It tells you what to do when a disaster strikes. It is a written plan/document that tells an organisation what steps are needed to restore the company operations in the event of a disaster.
What are the stages of the DDRP?
- Emergency plan
- Backup plan
- Recovery plan
- Test plan
Why do you need to make all of the plans?
To be prepared in the case of a scenario,
to test them all and
to know that they will work.
Advantages of cloud computing
- Less effort is needed
- Save on energy bills
- Businesses require less storage hardware
- Decreases the amount of software licensing and software installation needed
Disadvantages of cloud computing
- Security of the data is only as good as security in the plan
- Risk of losing internet connectivity
- You need a stable internet connection
Things for evaluation criteria and the effectiveness of information management strategies
- Integrity of data
- Security
- Ease of retrieval
- Currency of issues
Describe data integrity
refers to whether data is ‘trustworthy’
Describe security
Is the data safe from unauthorised access or alteration?
Describe easy of retrieval
- Files should be easy to retrieve and quickly found
Describe currency of issues
- Regular backups will ensure that the most recent versions of files are available if needed
What are security procedures
- Storage
- Backups
- Disposal
- Archiving
Describe storage
File naming conventions, storing data in a correct manner.
Describe archiving
Process of copying files to long-term storage, then deleting them from the first hard drive
Describe disposal
Disposing of unwanted equipment. Need to archive or destruct of data first.
Examples of personal information
Characteristics used to identify someone
- Name
- Address
- Age
- Gender
Examples of sensitive information
Legally don’t have to answer
- Racial origin
- Political opinions
- Sexual preference
- Criminal record
Examples of health information
- Medical history
- Current medical condition
- Dental records
- Donations of body parts
Describe the privacy act (commonwealth).
- 1988
- It covers private organisations who earn more than $3 million per year
- It outlines the handling of the collection, use and disclosure, storage and disposal of personal information by both electronic and manual or conventional forms of data gathering.