Topic D - Protecting Data and Information Flashcards
What does antivirus do?
Detect any suspicious programs and remove them before they can cause problems.
How does antivirus detect malware?
Scanning newly added files and software, as well as through regularly scheduled scans of storages devices connected to your system.
What will take anti virus longer?
Size of storage device Amount of data being used How defragmented hard disk is Applications running Existing malware
What is a firewall?
Monitors the traffic coming into and out of your computer systems via it ports over a network to look for anything suspicious.
How do firewall prevent harm?
Blocks off any suspicious data.
What is malicious software?
A computer program that is designed to harm or gain unauthorised access to a computer system.
What are the 4 types of malware?
Viruses
Worms
Trojans
Spyware
What are viruses?
A program that copies and insert itself into programs running on your computer system (spreads when programs/data is attached and passed to another system).
What are worms?
A program that copies and inserts itself into programs running on your computer system (spread through a network and find security holes in systems to gain access).
What are trojans?
A harmful program that masquerades as a legitimate software application (spreads by users downloading it thinking its a program).
What is a spyware?
A malicious program that monitors user activity for the purpose of stealing personal information.
What impact does malware have on individuals and organisations?
Can be used to corrupt and delete data on IT systems, which mean they have to spend time recovering data from backups.
What is a hacker?
Someone who gains unauthorised access to a computer system.
What are white hat hackers?
They test systems for security flaws by attempting to gain access to help check the security procedures of an organisation.
What is the impact of hackers on individuals and organisations?
Unauthorised access can be used to steal financial, personal or business information.
The data can also be used for blackmail.
What is meant by the term phishing?
Where emails or messages are sent to pretend to be from a reputable company but in fact they are not instead they are a malicious user who have the purpose to gain personal or financial information.
What is the impact of phishing on individuals/businesses?
The personal or financial information obtained can be used for stealing money or identity fraud or hacking into the business.
What is accidental damage?
Where IT systems or data are harmed through human error, such as dropping a device or accidentally overwriting important files.
What 7 techniques are there for protecting data?
File permissions Access levels Backup and recovery procedures Passwords Physical access controls Digital certificates Protocols
What does file permissions do?
You can set who can access the files and what they can do with them.
What 3 files permissions can you set?
Read only
Write only
Full control
What is read only?
Files can be opened and viewed, but not edited.
What is read/write?
Files can be opened, viewed, edited, modified and deleted.