study Flashcards

1
Q

Define big data

A

Big data is data that contains greater variety arriving in increasing volumes and with ever-higher velocity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define open data

A

Digital information licensed in a way available to anyone, with few stipulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define linked data

A

Structured data which is interlinked with other data to become more useful in semantic queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define digital inclusion

A

Everyone should be able to make full use of digital technologies and the benefits they bring, while avoiding their potential negative consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a digital threat

A

Either intentional or accidental activities compromising an information system’s security by breaching the CIA Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Moore’s Law

A

A prediction made in 1965 by Gordon Moore, that computing power will double every 1.5-2 years, due to the doubling of the number of transistors in each chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is Moore’s Law expected to remain true in the near future? Why/ why not?

A

Likely not. The law is starting to plateau because not as many transistors can fit on the chip as needed. However, the law could become true again in the future with quantum computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who was Tim Berners Lee

A

Inventor of HTML and CSS who successfully advocated for open data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define data privacy

A

Principle that a person should have control over their personal data, including the ability to decide how organizations collect, store and use their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the ‘C’ in the CIA Triad

A

Refers to protecting CONFIDENTIALITY. Breaches in confidentiality occur when an unauthorised person sees data during transit, and can lead to reputational damage and legal issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the ‘I’ in the CIA Triad

A

Refers to maintaining INTEGRITY. Breaches in integrity occur when someone intercepts and maliciously modifies data. e.g. hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the ‘A’ in the CIA Triad

A

Refers to assuring AVAILABILITY. Breaches in availability occur when someone interferes with transmission to prevent data form reaching final destination e.g. through DDoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of malware

A

Malware is used to disrupt, disable and take control of digital applications through exploiting technical flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three types of cyber threats?

A

Digital Threats, Human and insider threats, Physical and environmental threats,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the four types of Digital Threats

A
  1. Cybersecurity (e.g. malware, phishing, data breaches etc.)
  2. Technological (e.g. IoT vulnerabilities, weak encryption etc.)
  3. Emerging tech (e.g. deepfakes, quantum computing etc.)
  4. AI and Automation (e.g. Automated data processing, AI bias etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some countermeasures against digital threats

A

Countermeasures include:
- Use robust cybersecurity tools
- Regularly update software
- Apply security patches
- Implement strong encryption
- Stay informed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain Human and Insider threats, giving examples of each

A

Human threats are posed by humans, and include social engineering and data theft. Insider threats are posed by people who are part of the organisation at risk e.g. malicious or negligent employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some countermeasures to prevent Human and Insider threats?

A
  • Sufficiently training employees (preventing human/ insider threats)
  • Authorisation - employees only have access to the information they need
  • Monitoring user activities, password policies etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain Physical and Environmental threats, giving examples of each

A

Physical Threats are when the physical machinery fails (e.g. hardware failures, device theft, accidental damage, vandalism). Environmental threats are posed by the environment (e.g. natural disasters, dust and contaminants, temperature variations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some countermeasures against Human and Environmental threats?

A
  • Secure physical access to data centers and storage facilities
    * Disaster recovery and backup solutions
    * Cloud-based data storage with redundancy for resilience
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is personal data and why does it need to be protected

A

An information relating to an identified or identifiable person e.g. name, date of birth, email address, phone number, address, physical characteristics etc. This information needs to be protected, because if it is not crimes like identity theft are much more likely and easier to be committed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a DDoS attack

A

DDoS stands for Distributed Denial of Service. It is an online attack which involves hacking groups flooding systems to prevent them from working. This impacts the availability of data (CIA Triad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain the purpose of the 1998 Federal Privacy Act

A

Promoting individuals privacy with obligations about collecting and handling personal information.

24
Q

Who does the Federal Privacy Act apply to?

A

Any businesses with an annual turnover of $3 million +/year, any organisation that collect and handle personal or health information, media, politicians and some schools. You can opt in to follow the Act (even if not obligated to), to gain client trust.

25
Q

Encryption

A

The scrambling or changing of a message to hide original text. Converting plaintext to ciphertext.

26
Q

Decryption

A

Unscrambling cipher text to make it readable (plain text)

27
Q

Key

A

The way to decrypt a message only known by sender and receiver

28
Q

Random substitution encryption

A

A form of encryption where every letter in the message is shifted by a different amount. The key is usually 10 digits long.

29
Q

Symmetric encryption

A

A form of encryption where two parties agree on the key ahead of time (both sides have the same key). It is less secure, however faster to use.

30
Q

Conditionally Secure

A

Encryption schemes in which the cost of breaking the cipher exceeds the value of the information (e.g. time taken to decipher is longer than the time the information is relevant for).

31
Q

Unconditionally secure

A

When an encryption scheme is impossible to decrypt because the necessary information is not available to the cryptanalyst. There are currently no unconditionally secure encryption schemes.

32
Q

Brute-force attack

A

An attempt to hack an information system, where the attacker has not information, but attempts every possible combination key.

33
Q

Plain text

A

An original message

34
Q

Ciphertext

A

The coded message

35
Q

Cryptography

A

The area of study of the many schemes used for encryption

36
Q

Cryptographic system

A

A scheme e.g. Caesar’s cipher

37
Q

Cryptanalysis

A

Techniques used for deciphering a message without any knowledge of the enciphering details. Hacking ciphertext.

38
Q

Cryptology

A

The areas of cryptography and cryptanalysis

39
Q

Caesar’s Cipher

A

The first encryption scheme, where every letter in the original message is shifted by the same amount (the key is one number long)

40
Q

Asymmetric encryption

A

Uses two keys: a public key for encrypting messages and a private key for decrypting them. The public key is openly shared, while the private key remains confidential, ensuring that only the intended recipient can decrypt the message.

41
Q

Bits

A

Bits are binary digits, or combinations of eight 1 and 0’s to represent every caracter

42
Q

Byte

A

8 bits are a byte

43
Q

Data Encryption Standard (DES)

A

This is a symmetric encryption scheme which as surpassed (became insecure) in 2001. It was used by the US National Security Agency. Data was encrypted in 64-bit blocks using a 64-bit key.

After being surpassed, Triple DES was made where each block of data was encrypted 3 times, substantially slowing down the encryption process whilst increasing the security.

44
Q

Advanced Encryption Standard (AES)

A

The gold standard of symmetric encryption, made in 2001 involving multiple rounds of permutation, substitution and transposition. Each round has it’s own key and is encrypted in blocks of varying size i.e. 128, 192, 256 bits.

45
Q

Rivest-Shamir-Adleman (RSA)

A

Made in 1977, it is an extremely secure asymmetric encryption system using two massive prime numbers multiplied by each other.

46
Q

Monoalphabetic Ciphers

A

Substitution cipher where each letter in the plaintext is replaced by a corresponding letter in the cipher alphabet (which is jumbled). The key remains fixed, so every occurrence of a specific letter is consistently replaced with the same letter, making it more vulnerable to frequency analysis. e.g. basic scramble and Playfair cipher (using a grid with a special word then following letters)

47
Q

Polyalphabetic Ciphers

A

Uses multiple substitution alphabets to encode the message, making it harder to break with frequency analysis. Each letter in the plaintext may be substituted differently depending on its position or a key. e.g. Vigenère cipher (adding numerical values of word and cipher text)

48
Q

Transposition Cipher

A

A transposition cipher is an encryption method where the order of letters in the plaintext is rearranged according to a certain system to create the ciphertext, without altering the letters themselves. SYMMETRIC SYSTEM

49
Q

APP 1

A

Open and transparent management of personal information. To follow APP 1, organisations must provide users with a short privacy policy, written in English which is freely and easily available.

50
Q

APP 6

A

Regarding the use or disclosure of personal information - how businesses use information. Information must only be used/ disclosed for the purpose for which it was collected (primary purpose). This purpose must be listed in the privacy policy.

51
Q

APP 11

A

Regarding the security of information. Organisations must take reasonable steps to protect personal information they hold from misuse, interference and loss, or use against the CIA Triad by deleting/ de-identifying information that is no longer relevant/ useful.

52
Q

Vigenere Cipher

A

A polyalphabetic substitution symmetric cipher, where each letter has it’s own number and is shifted that number form the letter corresponding in the key. Fixes the double letter issue, so harder to decipher

53
Q

Playfair Cipher

A

A monoalphabetic symmetric cipher which is based on a 5x5 grid with a key word. Does not completely hide the structure of plaintext.

54
Q

Railfence cipher

A

Transposition cipher, using a grid and ascending/ descending diagonals. The depth of the grid is the encryption key.

55
Q
A