Security Flashcards
How can data be damaged?(5)
1) Data entry error
2) Program crashes
3) Accidental deletion
4) Hardware failure
5) Natural disasters
Pharming
Fraudulent practice of directing Internet users to a bogus website that mimics the appearance of a legitimate one, in order to obtain personal information such as passwords, account numbers, etc.
Phishing
to try to obtain financial or other confidential information from Internet users, typically by sending an email that looks as if it is from a legitimate organization, usually a financial institution, but contains a link to a fake website that replicates the real one
How can backup keep data safe?
Usually stored far away from the main server, transaction happens often, in case of accidental deletion or natural disaster data can be recovered
List methods of keeping data safe
Double entry, Backups, Locks on doors, Biometric security
What is a name of a system, which logs every action?
Audit trails
Proxy server
Acts as an intermediate between server + computer. IP of a computer can’t be detected + can’t be possible to make a profile of a person
How can proxy server improve performance?(2)
1) Proxy stores a copy of frequently visited websites
2) Improves security by filtering out malware
SSL
Security Socket Layer
What does SSL do?
Used by websites to transmit private info
How would a URL with SSL start?
https
TLS
Transport Layer Security
What is TSL?
Update to SSL which enables to overcome POODLE
Example of symmetric encryption
Cesar cypher
Explain Symmetric encryption
Plain text is converted to cypher text and transferred. Cypher is converted into plain text using the same encryption key