study Flashcards
Define big data
Big data is data that contains greater variety arriving in increasing volumes and with ever-higher velocity.
Define open data
Digital information licensed in a way available to anyone, with few stipulations.
Define linked data
Structured data which is interlinked with other data to become more useful in semantic queries.
Define digital inclusion
Everyone should be able to make full use of digital technologies and the benefits they bring, while avoiding their potential negative consequences.
Define a digital threat
Either intentional or accidental activities compromising an information system’s security by breaching the CIA Triad.
Explain Moore’s Law
A prediction made in 1965 by Gordon Moore, that computing power will double every 1.5-2 years, due to the doubling of the number of transistors in each chip.
Is Moore’s Law expected to remain true in the near future? Why/ why not?
Likely not. The law is starting to plateau because not as many transistors can fit on the chip as needed. However, the law could become true again in the future with quantum computing.
Who was Tim Berners Lee
Inventor of HTML and CSS who successfully advocated for open data
Define data privacy
Principle that a person should have control over their personal data, including the ability to decide how organizations collect, store and use their data.
What is the ‘C’ in the CIA Triad
Refers to protecting CONFIDENTIALITY. Breaches in confidentiality occur when an unauthorised person sees data during transit, and can lead to reputational damage and legal issues.
What is the ‘I’ in the CIA Triad
Refers to maintaining INTEGRITY. Breaches in integrity occur when someone intercepts and maliciously modifies data. e.g. hacking
What is the ‘A’ in the CIA Triad
Refers to assuring AVAILABILITY. Breaches in availability occur when someone interferes with transmission to prevent data form reaching final destination e.g. through DDoS.
What is the purpose of malware
Malware is used to disrupt, disable and take control of digital applications through exploiting technical flaws.
What are the three types of cyber threats?
Digital Threats, Human and insider threats, Physical and environmental threats,
Explain the four types of Digital Threats
- Cybersecurity (e.g. malware, phishing, data breaches etc.)
- Technological (e.g. IoT vulnerabilities, weak encryption etc.)
- Emerging tech (e.g. deepfakes, quantum computing etc.)
- AI and Automation (e.g. Automated data processing, AI bias etc.)
What are some countermeasures against digital threats
Countermeasures include:
- Use robust cybersecurity tools
- Regularly update software
- Apply security patches
- Implement strong encryption
- Stay informed
Explain Human and Insider threats, giving examples of each
Human threats are posed by humans, and include social engineering and data theft. Insider threats are posed by people who are part of the organisation at risk e.g. malicious or negligent employees.
What are some countermeasures to prevent Human and Insider threats?
- Sufficiently training employees (preventing human/ insider threats)
- Authorisation - employees only have access to the information they need
- Monitoring user activities, password policies etc.
Explain Physical and Environmental threats, giving examples of each
Physical Threats are when the physical machinery fails (e.g. hardware failures, device theft, accidental damage, vandalism). Environmental threats are posed by the environment (e.g. natural disasters, dust and contaminants, temperature variations).
What are some countermeasures against Human and Environmental threats?
- Secure physical access to data centers and storage facilities
* Disaster recovery and backup solutions
* Cloud-based data storage with redundancy for resilience
What is personal data and why does it need to be protected
An information relating to an identified or identifiable person e.g. name, date of birth, email address, phone number, address, physical characteristics etc. This information needs to be protected, because if it is not crimes like identity theft are much more likely and easier to be committed.
What is a DDoS attack
DDoS stands for Distributed Denial of Service. It is an online attack which involves hacking groups flooding systems to prevent them from working. This impacts the availability of data (CIA Triad)