Unit 1: Learning Aim C Flashcards

1
Q

What are threats?

A

Risks to the security of data or equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are 6 threats to data?

A
Opportunity threats
Computer viruses
Other malware
Phishing
Accidental damage
Hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are opportunity threats?

A

Threats from people who see an opportunity such as an unattended computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are computer viruses?

A

Malicious programs that try to replicate and spread across a computer or a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are other malware?

A

Trojans,worms,adware,spyware and other nasty software that is aiming to cause damage or steal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is phishing?

A

A fake email or website that is trying to trick the user in handing over their personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an accidental damage?

A

Floods, fires,or hurricanes or damage from untrained users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are hackers?

A

People who purposely try to gain unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are 9 protections of data?

A
Physical barriers
Password control of access
Access levels
Anti-virus software
Firewall
Encryption
Backup and recovery
Recovery
Personal safety
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are physical barriers?

A

Real world protection such as locks on doors,CCTV cameras and turning computers off at night

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is password control of access?

A

Using strong passwords that are at least eight characters long and include at least one uppercase letter,lowercase letter,number and symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are access levels?

A

Ensuring people only have access to the parts of the system they need and trainig them before giving them greater access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is anti-virus software?

A

Software that deletes or quarantines viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is firewall?

A

Software that monitors data coming in and out of a network and protects it from viruses, malware and hackers. It puts a wall around a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is encryption?

A

Turning data into a secret code before sending it over a network or the internet so that if it is intercepted it will not be understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is backup and recovery?

A

Making a copy of data in a different place to the original data in case the orriginal becomes corrupted or is accidentally deleted

17
Q

What is recovery? Example? Example on server?

A

Replacing the data if somerthing happens such as feletion or corruption.
This may include copying the files from the backup to their original location or using a software recovery tool.

In servers, this may involve replacing a damaged drive with a new one already loaded with backup data

18
Q

What is personal safety? Why is this important?

A

Security settings can be used on social networking sites to protect users’ privacy and reputation

Important because not everyone is who they claim to be. Also, you might not want your teacher or colleage to see something embarrasinng or harmful to your reputation

19
Q

What is physical barriers used on?

A

Opportunity threats (Hackers?)

20
Q

What is password control of access used on?

A

Hackers

21
Q

What is access levels used on?

A

Accidental damage

22
Q

What is anti-virus software used on?

A

Computer viruses

23
Q

What is firewall used on?

A

Other malware computer viruses

24
Q

What is encryption used on?

A

Hackers, other malware that try to steal data

25
Q

What is backup and recovery used on?

A

Accidental damage,computer viruses,other malware,hackers

26
Q

What is recovery used on?

A

Accidental damage,computer viruses,other malware,hackers

27
Q

What is personal safety used on?

A

Hackers and identity theft

28
Q

What is identity theft?

A

Where someone uses aanother individual’s personal details to pretend they are them. They may set up accountd, access bank accounts or make purchases

29
Q

How can identity theft be prevented?

A

Users should keep their personal details private including on socail networking sites.

30
Q

Name 4 UK Legalisations

A

Data Protection Act 1998
Computer Misuse Act 1990
Copyright,Designs and Patents Act 1988
Freedom of Information Act 2000

31
Q

What is the Data Protection Act 1998?

A

Buisiness must conform to the eight principles to protect the data that they hold about the customers

32
Q

What is the Computer Misuse Act 1990?

A

This law was created to punish hackers and creators of viruses

33
Q

What is the Copyright,Designs and Patents Act 1988?

A

Copyright protects peoples original data such as artwork,code,books,etc.

34
Q

What is the Freedom of Information Act 2000?

A

This gives people the right to see data held about them by organisations, and also to request access to data about organisations such as local councils or national government

35
Q

What two things can technology monitor?

A

Movement

Communication

36
Q

What are 3 technologies that monitor movement?

A
  • CCTV cameras
  • GPS devices (like those in smartphones)
  • Data from airports such as passenger lists
37
Q

What are 3 technologies that monitor communication?

A
  • Monitoring email
  • Monitoring website visits
  • Logging keywords typed into search engines