Security Flashcards

1
Q

How can data be damaged?(5)

A

1) Data entry error
2) Program crashes
3) Accidental deletion
4) Hardware failure
5) Natural disasters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Pharming

A

Fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Phishing

A

to try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How can backup keep data safe?

A

Usually stored far away from the main server, transaction happens often, in case of accidental deletion or natural disaster data can be recovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

List methods of keeping data safe

A

Double entry, Backups, Locks on doors, Biometric security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a name of a system, which logs every action?

A

Audit trails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Proxy server

A

Acts as an intermediate between server + computer. IP of a computer can’t be detected + can’t be possible to make a profile of a person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can proxy server improve performance?(2)

A

1) Proxy stores a copy of frequently visited websites

2) Improves security by filtering out malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL

A

Security Socket Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does SSL do?

A

Used by websites to transmit private info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How would a URL with SSL start?

A

https

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

TLS

A

Transport Layer Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is TSL?

A

Update to SSL which enables to overcome POODLE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Example of symmetric encryption

A

Cesar cypher

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain Symmetric encryption

A

Plain text is converted to cypher text and transferred. Cypher is converted into plain text using the same encryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disadvantage of symmetric encryption

A

If the key gets compromised everyone can read the conversation

17
Q

How does asymmetric encryption work?

A

Public key is shared - plain text encrypted with a public key - cypher text transmitted - cypher text is decrypted using private key

18
Q

Who has access to a public key?

A

Anyone