Security, Privacy and Data Integrity Flashcards

1
Q

What is data security?

A

Ensuring data is protected against loss and unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is data integrity?

A

Making sure that data is valid and not corrupted after transmission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is data privacy?

A

Ability to determine what data is shared with third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How does data security differ from system security?

A

Data security protects data on a system; system security protects the computer system itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give an example of a data security measure.

A

Encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give an example of a system security measure.

A

User ID and Password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is malware?

A

Software intentionally designed to damage a computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a computer virus?

A

Self-replicating software that may crash or corrupt a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spyware?

A

Software that gathers user information without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How can you protect against malware?

A

Install and regularly update anti-virus and anti-spyware software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is hacking?

A

Illegal access to a computer system to steal or corrupt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you protect against hacking?

A

Use strong passwords and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is phishing?

A

Email scam to obtain personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can you protect against phishing?

A

Ignore suspicious emails and use SPAM filters and firewalls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is pharming?

A

Redirecting users to fake websites to steal their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can you protect against pharming?

A

Use reliable ISPs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are user accounts and passwords used for?

A

To deny access to unauthorized users and manage user privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a firewall?

A

Hardware or software that filters information between a computer and the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do software firewalls work?

A

They make decisions about what to allow or block based on software behavior.

20
Q

What is authentication?

A

Process of verifying user identity using passwords

21
Q

What does antivirus software do?

A

Detects and removes viruses by checking files for known malicious patterns.

22
Q

What does antispyware software do?

A

Detects and removes spyware from the system.

23
Q

What is encryption?

A

Converts data into unreadable code to prevent unauthorized access.

24
Q

What is the purpose of decryption software?

A

To decode encrypted data back into readable form.

25
What are access rights (authorization)?
Assigning different levels of data access to different users to increase security.
26
What is data backup?
Creating an exact copy of data in case the original is lost or corrupted.
27
What is disk mirroring?
A real-time strategy that writes data to two or more disks simultaneously.
28
How does disk mirroring help data security?
If one disk fails
29
How does data validation protect data integrity?
Checks if entered data is valid and in correct format.
30
How does data verification protect data integrity?
Ensures entered or transferred data is accurate.
31
What is a range check?
Ensures data is between set minimum and maximum values.
32
What is a format check?
Ensures data follows the correct pattern or order.
33
What is a length check?
Ensures data has the correct number of characters.
34
What is a presence check?
Checks if required data has been entered.
35
What is an existence check?
Verifies that entered data actually exists.
36
What is a limit check?
Ensures a value is within acceptable min and max values (not both).
37
What is a check digit?
A digit resulting from an operation on other digits to verify accuracy.
38
What is a visual check in verification?
Manual comparison of original data with entered data.
39
What is double entry in verification?
Entering data twice and comparing both entries for accuracy.
40
Why is data verification important during data transfer?
To ensure data is not corrupted during movement.
41
What is a parity check?
Checks that the number of 1s in a byte is odd or even as agreed.
42
What happens if a parity check fails?
The receiving device requests data to be resent.
43
What is a limitation of parity checks?
They cannot detect errors if two bits are swapped.
44
What is a checksum check?
Sum of all bytes sent; compared before and after transmission to detect errors.
45
How does checksum check help with data integrity?
If the checksum before and after sending differs