Security of Data Flashcards

1
Q

What is a virus?

A
  • a virus is a software or code that can replicate itself with the intention of corrupting or deleting files on a computer
  • it can cause a computer to malfunction as it fills up the hard drive space.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the possible effect of the risk of getting a virus?

A
  • can cause the computer to crash
  • data can be deleted on a computer
  • corrupt operating system and make computer run slower
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Methods to prevent virus

A
  • install anti-virus software and update regulalry
  • don’t use software from unknown source
  • be careful when opening email attachment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Hacking?

A
  • an act of gaining unauthorized access to a computer system
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Possible effect of the risk of phishing

A
  • creator of email can gain personal data such as bank account or credit card numbers
  • can lead to fraud or identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Possible of effect of the risk of getting hacked

A
  • can lead to identity theft or the misuse of personal information
  • data can be deleted or corrupted on user’s computer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Methods to prevent hacking

A
  • use of strong passwords and user ID
  • use of intrusion detection software
  • use of firewalls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the task of Firewall?

A

~!Firewall can either be software or hardware!~

  • Firewall is used to block unauthorized connection made to your computers from the internet
  • examines and monitors traffic to and from a user’s computer and network/internet
  • warns user when there is an attempt of trying to access external data sources
  • can prevent hackers gaining access.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Phishing?

A
  • is when a legitimate-looking email is send to a user. As soon as the user click the link in the email attached, they are sent to a fake website which will fool the user to provide personal information
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Methods to prevent phishing

A
  • user should be cautious when opening email attachment
  • don’t click on executable attachment that end in .exe,.bat,.com
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is pharming?

A
  • a malicious code installed on user’s computer and will redirect user to a fake website w/o user knowledge
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Possible effect of the risk of getting pharmed

A
  • creator of email or code can gain personal data such as bank account or credit card numbers
  • can lead to fraud or identity theft
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Methods to prevent risk of pharming

A
  • use anti-spyware software that can remove pharming code from the computer
  • user should always be alert and look out for clues that they are being redirected to
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spyware and key-logging software?

A
  • gathers data by monitoring key pressed on the keyboard, the gathered data is then sent back to the person who sent the software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Possible effect of the risk of spyware

A
  • give the sender access to all data entered keyboard on the user’s computer
  • the software is able to install spyware, read cookie data and also change a user’s default browser
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Methods to remove risk of getting spyware

A
  • using anti-spyware software to reduce risk
  • should always be alert and check for clues that their keyboard is being monitored
  • use pointing device when typing password
15
Q

What are some ways to prevent the threat?

A
  • Firewall
  • Encryption
  • Authentication techniques
    > user ID and password
    > biometrics
16
Q

What is Authentication?

A
  • used to verify the data that comes from a secure and trusted source.
  • Authentication techniques :
    > User ID/Password
    > Biometric authorization (fingerprint scan, iris scan, face scan)
17
Q

What is the use of User ID and Password?

A
  • ID or Identifier is a name to gain access to a computer system.
  • Password is a secret series of characters that enables a user to access a file, computer, or program. The passwords help ensure no unauthorized users access the computer
18
Q

What is the use of Biometrics?

A
  • it is a method where the users are authenticated using their body parts or human characteristics
19
Q

What are some examples of biometric?

A
  • fingerprints
  • voice recognition
  • face recognition
  • iris recognition
  • signature recognition
20
Q

Encryption

A
  • its a method where the data is scrambled into garbled code using encryption key
21
Q

What is the use of encryption?

A
  • requires an encryption key to encrypt the data
  • protects sensitive data from being understood by hackers
  • hackers will not understand the data if they dont have the key but data still can be deleted
  • only authorized user/computer w/ decryption key can unscramble the data and read it.