Threats to Data Topic D Flashcards
What is a trojan
A piece of malware that allows the hacker to gain full control of the users computer, this is commonly diagnosed via emails as the hacker pretends to be a reliable source when its not causing harm for the user’s PC
What is spyware
A piece of malware that is installed onto the computer which allows the hacker to gain small amount of data each time, this makes it harder for the user to know if they have it installed
What is a worm
A self replicating programme which uses the network to send copies of itself to computers on the network, this can be done due to security weakness
What is Phishing
A email fraud method where hackers send out a authentic looking email pretending to be another organisation to gain personal information
What is accidental damage
This is where the user causes the damage the system unintentionally, this can be dropping the computer, leaving the device open, not saving any work
How can access levels prevent damage to the computer
This has permissions on a users system depending on what role they have, for example a student can view and alter their own documents but can se others and also has limitations on what software they can use, teachers can see students documents but not other teachers but has more software permissions that students, admin has full control and can add pupils, assign roles or delete documentations
How can back up and recover prevent damage to your files
This is to keep data up to date and in case of your system crashing or work being lost, it can be recovered from the latest back up. There is various types of back ups such as incremental which saves only new data, full which saves the entire document again, differential back ups which is basically the same as incremental.
Son, back up happens once a day
Father the earliest one for that week happens once a week
Grandfather, earliest one of that month saves
How can passwords protect your data
This gives more security as it adds more details the user must know to get into the account, when picking a password it must be long, not relate to anything personal include multiple different characters and changed regularly
How can physical access control protect data
This is a security technique for who and what the user can access in an environment, there is a wide range of physical access controls:
Access control cards, these cards have a magnetic strip that gives you access to a certain environment if you own the car but cannot enter without
Keypads, the system has a code which the user who has permission will know, if they know the code they can type it in the key pad and gain access, if not they will be denied
Biometric scans, this scans biometric data to see if you have permission to enter or not, this can be face id, finger print, iris scan
How can digital certificated protect data
This is a method of guarantee which the organisation can purchase to prove their authenticity, this can be seen on emails (encrypted) and the internet , when googling a site if it has a padlock it means it is safe and owns a digital certificate
How can protocols protect data
This is a set of rules when transmitting data between different devices on a network. There is several protocols such as SSL and TSL (more modern), This provides a secure connection
How can file permissions protect data
This provides a set of permissions the user has over the document. Read only allows the user to only view the document but can not to anything else, this is beneficial as it can stop users from altering data or erasing it, Read and write, this gives the user the access to alter the text and also view it and full control, this allows the user full control over the document and can do what ever they want to it
How can anti-virus help prevent damage done to the computer
This uses signature detection and heuristic scans to analyse the pattern and if anything unusual is seen the software will alert the user they have a virus diagnosed onto the system, this software can remove existing viruses off the computer and protect data, when using antivirus software you can schedule how regular you want the software to scan your computer (scheduled scans). When using this you need to ensure it is regularly maintained and updated to prevent any viruses not being removed.
How can firewall protect data
This is a programme that uses packet filtering to spot unsafe data entering the computer, if any data is unsafe the computer blocks access to the website protecting the user, this is beneficial as it stops viruses being diagnosed onto the system whereas anti virus software alerts once it has already been diagnosed which can be too late
How can encryption protect data
This codes a piece of data which prevent the hacker from seeing the original data, this can be coded using a private key and can only be decoded using the same key ,if lost the data can not be converted again resulting in lost data, there is also a public key which is used when transmitting data to another user, this can prevent data being intercepted during transmission