Topic D - Protecting Data and Information Flashcards

1
Q

What does antivirus do?

A

Detect any suspicious programs and remove them before they can cause problems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does antivirus detect malware?

A

Scanning newly added files and software, as well as through regularly scheduled scans of storages devices connected to your system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What will take anti virus longer?

A
Size of storage device
Amount of data being used
How defragmented hard disk is
Applications running
Existing malware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a firewall?

A

Monitors the traffic coming into and out of your computer systems via it ports over a network to look for anything suspicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do firewall prevent harm?

A

Blocks off any suspicious data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is malicious software?

A

A computer program that is designed to harm or gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 4 types of malware?

A

Viruses
Worms
Trojans
Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are viruses?

A

A program that copies and insert itself into programs running on your computer system (spreads when programs/data is attached and passed to another system).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are worms?

A

A program that copies and inserts itself into programs running on your computer system (spread through a network and find security holes in systems to gain access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are trojans?

A

A harmful program that masquerades as a legitimate software application (spreads by users downloading it thinking its a program).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a spyware?

A

A malicious program that monitors user activity for the purpose of stealing personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What impact does malware have on individuals and organisations?

A

Can be used to corrupt and delete data on IT systems, which mean they have to spend time recovering data from backups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a hacker?

A

Someone who gains unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are white hat hackers?

A

They test systems for security flaws by attempting to gain access to help check the security procedures of an organisation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the impact of hackers on individuals and organisations?

A

Unauthorised access can be used to steal financial, personal or business information.
The data can also be used for blackmail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is meant by the term phishing?

A

Where emails or messages are sent to pretend to be from a reputable company but in fact they are not instead they are a malicious user who have the purpose to gain personal or financial information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the impact of phishing on individuals/businesses?

A

The personal or financial information obtained can be used for stealing money or identity fraud or hacking into the business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is accidental damage?

A

Where IT systems or data are harmed through human error, such as dropping a device or accidentally overwriting important files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What 7 techniques are there for protecting data?

A
File permissions
Access levels
Backup and recovery procedures
Passwords
Physical access controls
Digital certificates
Protocols
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does file permissions do?

A

You can set who can access the files and what they can do with them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What 3 files permissions can you set?

A

Read only
Write only
Full control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is read only?

A

Files can be opened and viewed, but not edited.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is read/write?

A

Files can be opened, viewed, edited, modified and deleted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are access levels?

A

Control what software, data and services a user can access.

25
Q

What is the highest access level?

A

Administrator access.

26
Q

What is administrator access?

A

A user can access all folders with full control, alter the permissions of other users and can install and delete software.

27
Q

What can the lowest access level do?

A

A user can only access a limited number of files and the software they need to do their job.

28
Q

What are backups?

A

Involves taking a copy of the data and storing it in a secondary location.

29
Q

What three types of backups are there?

A

Full backups
Incremental backup
Differential backup

30
Q

What is a full backup?

A

A complete backup of all your data.

31
Q

What is an incremental backup?

A

A backup of only the data that has changed since the previous backup.

32
Q

What is differential backup?

A

A mixture of a full backup and an incremental backup.

33
Q

What does physical access controls do?

A

Prevent unauthorised users from gaining access to our IT systems.

34
Q

What are 4 examples of physical access controls?

A

Access cards
Keypad access control
Biometric
Electronic locks

35
Q

What are access cards?

A

Cards that must be scanned to unlock rooms.

36
Q

What are keypad access controls?

A

A system that requires a passcode to gain entry to a room.

37
Q

What are biometric access controls?

A

A system that scans biometric data to gain access to a room.

38
Q

What are electronic locks?

A

To lock and unlock doors electronically when sent signals from the above access controls systems.

39
Q

What are digital certificates?

A

Used to authenticate a user as the owner of a public key so they can use public key encryption.

40
Q

What is the 2 important contents to a digital certificate?

A

Digital signature

Public key

41
Q

What is a digital signature?

A

Verifies the sender identity

42
Q

What is the public key?

A

Used to encrypt data when sending it to the website.

43
Q

What are protocols?

A

A set of rules that defines a method for transmitting data between different devices over a network.

44
Q

What are the 2 security protocols?

A

SSL

TLS

45
Q

What do the security protocols allow us to do?

A

Send data securely over the internet using encryption.

46
Q

What are the 4 tools used for protecting data?

A

Antivirus
Firewalls
Encryption
Legislation and Codes of Practices

47
Q

What are 3 common features you see in antivirus software?

A

Scheduled scans (can be set automatically).
Full scans on entire hard disk.
Scanning of all fires opened (known as real time protection).

48
Q

What are 3 disadvantages of antivirus software?

A

Needs to be regularly maintained and updated as new viruses are found.
Doesn’t offer total protection as new malware programs being written.
Can slow down PC/network performance (take up hard disk space, memory, processing power).

49
Q

What are 3 common features of a firewall?

A
Content filtering (used for security/productivity purposes).
Controlling which programs can access the LAN/internet.
Intruder detection/prevention (identifies/stops hacker from gaining access to network or computer system).
50
Q

What is 3 disadvantages of firewalls?

A

Diminishes performance of the network.
Productivity can be impaired (things may be blocked by firewall when needed).
Cannot prevent internal attack from within the network.

51
Q

What 2 types of data do we encrypt?

A

Stored data

Transmitted data

52
Q

What is stored data?

A

Uses the same key to both encrypt and decrypt the data (symmetric encryption).

53
Q

What is transmitted data?

A

Uses different keys to encrypt and decrypt the data (asymmetric data).

54
Q

What are 2 implications of stored data?

A

If you lose the encryption key, you won’t ever able to decrypt the data.
Sharing of the encryption key can compromise security (key can be intercepted).

55
Q

What is an implication of transmitted data?

A

If working in large quantities data, the data have a real impact on processing power.

56
Q

What 2 legislation have been implemented to protect data and IT systems from harm?

A

Data protection act (1998)

Computer misuse act (1990)

57
Q

What is the data protection act (1998)?

A

Protect how individuals data can be used and handled.

58
Q

What is the computer misuse act (1990)?

A

Protects against the wilful harm and damage of the IT systems and data.