Unit 1: Learning Aim C Flashcards
What are threats?
Risks to the security of data or equipment
What are 6 threats to data?
Opportunity threats Computer viruses Other malware Phishing Accidental damage Hackers
What are opportunity threats?
Threats from people who see an opportunity such as an unattended computer
What are computer viruses?
Malicious programs that try to replicate and spread across a computer or a network
What are other malware?
Trojans,worms,adware,spyware and other nasty software that is aiming to cause damage or steal data
What is phishing?
A fake email or website that is trying to trick the user in handing over their personal information
What is an accidental damage?
Floods, fires,or hurricanes or damage from untrained users
What are hackers?
People who purposely try to gain unauthorised access
What are 9 protections of data?
Physical barriers Password control of access Access levels Anti-virus software Firewall Encryption Backup and recovery Recovery Personal safety
What are physical barriers?
Real world protection such as locks on doors,CCTV cameras and turning computers off at night
What is password control of access?
Using strong passwords that are at least eight characters long and include at least one uppercase letter,lowercase letter,number and symbol
What are access levels?
Ensuring people only have access to the parts of the system they need and trainig them before giving them greater access
What is anti-virus software?
Software that deletes or quarantines viruses
What is firewall?
Software that monitors data coming in and out of a network and protects it from viruses, malware and hackers. It puts a wall around a network
What is encryption?
Turning data into a secret code before sending it over a network or the internet so that if it is intercepted it will not be understood
What is backup and recovery?
Making a copy of data in a different place to the original data in case the orriginal becomes corrupted or is accidentally deleted
What is recovery? Example? Example on server?
Replacing the data if somerthing happens such as feletion or corruption.
This may include copying the files from the backup to their original location or using a software recovery tool.
In servers, this may involve replacing a damaged drive with a new one already loaded with backup data
What is personal safety? Why is this important?
Security settings can be used on social networking sites to protect users’ privacy and reputation
Important because not everyone is who they claim to be. Also, you might not want your teacher or colleage to see something embarrasinng or harmful to your reputation
What is physical barriers used on?
Opportunity threats (Hackers?)
What is password control of access used on?
Hackers
What is access levels used on?
Accidental damage
What is anti-virus software used on?
Computer viruses
What is firewall used on?
Other malware computer viruses
What is encryption used on?
Hackers, other malware that try to steal data
What is backup and recovery used on?
Accidental damage,computer viruses,other malware,hackers
What is recovery used on?
Accidental damage,computer viruses,other malware,hackers
What is personal safety used on?
Hackers and identity theft
What is identity theft?
Where someone uses aanother individual’s personal details to pretend they are them. They may set up accountd, access bank accounts or make purchases
How can identity theft be prevented?
Users should keep their personal details private including on socail networking sites.
Name 4 UK Legalisations
Data Protection Act 1998
Computer Misuse Act 1990
Copyright,Designs and Patents Act 1988
Freedom of Information Act 2000
What is the Data Protection Act 1998?
Buisiness must conform to the eight principles to protect the data that they hold about the customers
What is the Computer Misuse Act 1990?
This law was created to punish hackers and creators of viruses
What is the Copyright,Designs and Patents Act 1988?
Copyright protects peoples original data such as artwork,code,books,etc.
What is the Freedom of Information Act 2000?
This gives people the right to see data held about them by organisations, and also to request access to data about organisations such as local councils or national government
What two things can technology monitor?
Movement
Communication
What are 3 technologies that monitor movement?
- CCTV cameras
- GPS devices (like those in smartphones)
- Data from airports such as passenger lists
What are 3 technologies that monitor communication?
- Monitoring email
- Monitoring website visits
- Logging keywords typed into search engines