study Flashcards

1
Q

Define big data

A

Big data is data that contains greater variety arriving in increasing volumes and with ever-higher velocity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define open data

A

Digital information licensed in a way available to anyone, with few stipulations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define linked data

A

Structured data which is interlinked with other data to become more useful in semantic queries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define digital inclusion

A

Everyone should be able to make full use of digital technologies and the benefits they bring, while avoiding their potential negative consequences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define a digital threat

A

Either intentional or accidental activities compromising an information system’s security by breaching the CIA Triad.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain Moore’s Law

A

A prediction made in 1965 by Gordon Moore, that computing power will double every 1.5-2 years, due to the doubling of the number of transistors in each chip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is Moore’s Law expected to remain true in the near future? Why/ why not?

A

Likely not. The law is starting to plateau because not as many transistors can fit on the chip as needed. However, the law could become true again in the future with quantum computing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who was Tim Berners Lee

A

Inventor of HTML and CSS who successfully advocated for open data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define data privacy

A

Principle that a person should have control over their personal data, including the ability to decide how organizations collect, store and use their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the ‘C’ in the CIA Triad

A

Refers to protecting CONFIDENTIALITY. Breaches in confidentiality occur when an unauthorised person sees data during transit, and can lead to reputational damage and legal issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the ‘I’ in the CIA Triad

A

Refers to maintaining INTEGRITY. Breaches in integrity occur when someone intercepts and maliciously modifies data. e.g. hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the ‘A’ in the CIA Triad

A

Refers to assuring AVAILABILITY. Breaches in availability occur when someone interferes with transmission to prevent data form reaching final destination e.g. through DDoS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of malware

A

Malware is used to disrupt, disable and take control of digital applications through exploiting technical flaws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three types of cyber threats?

A

Digital Threats, Human and insider threats, Physical and environmental threats,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Explain the four types of Digital Threats

A
  1. Cybersecurity (e.g. malware, phishing, data breaches etc.)
  2. Technological (e.g. IoT vulnerabilities, weak encryption etc.)
  3. Emerging tech (e.g. deepfakes, quantum computing etc.)
  4. AI and Automation (e.g. Automated data processing, AI bias etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are some countermeasures against digital threats

A

Countermeasures include:
- Use robust cybersecurity tools
- Regularly update software
- Apply security patches
- Implement strong encryption
- Stay informed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Explain Human and Insider threats, giving examples of each

A

Human threats are posed by humans, and include social engineering and data theft. Insider threats are posed by people who are part of the organisation at risk e.g. malicious or negligent employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are some countermeasures to prevent Human and Insider threats?

A
  • Sufficiently training employees (preventing human/ insider threats)
  • Authorisation - employees only have access to the information they need
  • Monitoring user activities, password policies etc.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Explain Physical and Environmental threats, giving examples of each

A

Physical Threats are when the physical machinery fails (e.g. hardware failures, device theft, accidental damage, vandalism). Environmental threats are posed by the environment (e.g. natural disasters, dust and contaminants, temperature variations).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some countermeasures against Human and Environmental threats?

A
  • Secure physical access to data centers and storage facilities
    * Disaster recovery and backup solutions
    * Cloud-based data storage with redundancy for resilience
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is personal data and why does it need to be protected

A

An information relating to an identified or identifiable person e.g. name, date of birth, email address, phone number, address, physical characteristics etc. This information needs to be protected, because if it is not crimes like identity theft are much more likely and easier to be committed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a DDoS attack

A

DDoS stands for Distributed Denial of Service. It is an online attack which involves hacking groups flooding systems to prevent them from working. This impacts the availability of data (CIA Triad)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Explain the purpose of the 1998 Federal Privacy Act

A

Promoting individuals privacy with obligations about collecting and handling personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Who does the Federal Privacy Act apply to?

A

Any businesses with an annual turnover of $3 million +/year, any organisation that collect and handle personal or health information, media, politicians and some schools. You can opt in to follow the Act (even if not obligated to), to gain client trust.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Encryption
The scrambling or changing of a message to hide original text. Converting plaintext to ciphertext.
26
Decryption
Unscrambling cipher text to make it readable (plain text)
27
Key
The way to decrypt a message only known by sender and receiver
28
Rail Fence cipher
Transposition cipher, using a grid and ascending/ descending diagonals. The depth of the grid is the encryption key.
29
Random substitution encryption
A form of encryption where every letter in the message is shifted by a different amount, because the encryption alphabet is a (usually) randomised jumble. The key is usually 26 digits long.
30
Symmetric encryption
A form of encryption where two parties agree on the key ahead of time (both sides have the same key). It is less secure, however faster to use.
31
Conditionally Secure
Encryption schemes in which the cost of breaking the cipher exceeds the value of the information (e.g. time taken to decipher is longer than the time the information is relevant for).
32
Unconditionally secure
When an encryption scheme is impossible to decrypt because the necessary information is not available to the cryptanalyst. There are currently no unconditionally secure encryption schemes.
33
Brute-force attack
An attempt to hack an information system, where the attacker has not information, but attempts every possible combination key.
34
Plain text
An original message
35
Ciphertext
The coded message
36
Cryptography
The area of study of the many schemes used for encryption
37
Cryptographic system
A scheme e.g. Caesar's cipher
38
Cryptanalysis
Techniques used for deciphering a message without any knowledge of the enciphering details. Hacking ciphertext.
39
Cryptology
The areas of cryptography and cryptanalysis
40
Caesar's Cipher
The first encryption scheme, where every letter in the original message is shifted by the same amount (the key is one number long)
41
Asymmetric encryption
Uses two keys: a public key for encrypting messages and a private key for decrypting them. The public key is openly shared, while the private key remains confidential, ensuring that only the intended recipient can decrypt the message.
42
Bits
Bits are binary digits, or combinations of eight 1 and 0's to represent every caracter
43
Byte
8 bits are a byte
44
Data Encryption Standard (DES)
This is a symmetric encryption scheme which as surpassed (became insecure) in 2001. It was used by the US National Security Agency. Data was encrypted in 64-bit blocks using a 64-bit key. After being surpassed, Triple DES was made where each block of data was encrypted 3 times, substantially slowing down the encryption process whilst increasing the security.
45
Advanced Encryption Standard (AES)
The gold standard of symmetric encryption, made in 2001 involving multiple rounds of permutation, substitution and transposition. Each round has it's own key and is encrypted in blocks of varying size i.e. 128, 192, 256 bits.
46
Rivest-Shamir-Adleman (RSA)
Made in 1977, it is an extremely secure asymmetric encryption system using two massive prime numbers multiplied by each other.
47
Monoalphabetic Ciphers
Substitution cipher where each letter in the plaintext is replaced by a corresponding letter in the cipher alphabet (which is jumbled). The key remains fixed, so every occurrence of a specific letter is consistently replaced with the same letter, making it more vulnerable to frequency analysis. e.g. basic scramble and Playfair cipher (using a grid with a special word then following letters)
48
Polyalphabetic Ciphers
Uses multiple substitution alphabets to encode the message, making it harder to break with frequency analysis. Each letter in the plaintext may be substituted differently depending on its position or a key. e.g. Vigenère cipher (adding numerical values of word and cipher text)
49
Transposition Cipher
A transposition cipher is an encryption method where the order of letters in the plaintext is rearranged according to a certain system to create the ciphertext, without altering the letters themselves. SYMMETRIC SYSTEM
50
APP 1
Open and transparent management of personal information. To follow APP 1, organisations must provide users with a short privacy policy, written in English which is freely and easily available.
51
APP 6
Regarding the use or disclosure of personal information - how businesses use information. Information must only be used/ disclosed for the purpose for which it was collected (primary purpose). This purpose must be listed in the privacy policy.
52
APP 11
Regarding the security of information. Organisations must take reasonable steps to protect personal information they hold from misuse, interference and loss, or use against the CIA Triad by deleting/ de-identifying information that is no longer relevant/ useful.
53
Vigenere Cipher
A polyalphabetic substitution symmetric cipher, where each letter has it's own number and is shifted that number form the letter corresponding in the key. Fixes the double letter issue, so harder to decipher
54
Playfair Cipher
A monoalphabetic symmetric cipher which is based on a 5x5 grid with a key word. Does not completely hide the structure of plaintext.
55
Order of Precedence
PCNAO (Programmers code neatly and optimally, Parentheses, comparison, NOT, AND, OR)
56
Columns in a Table
Fields
57
Rows in a Table
Records
58
Result-set
Data returned form the SELECT statement
59
SQL words
Structured Query Language
60
Comparison Operators
=, <, >, <=, >=, <>/!=
61
Logical Operators
NOT - if condition is NOT true AND - if all records are true OR - if at least one record is true
62
SQL
Structured Query Language. Used to access and manipulate a relational database (e.g. retrieve, insert, update, delete, create, store, view etc.)