Data security, privacy and integrity

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/33

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 8:12 AM on 4/7/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

34 Terms

1
New cards

“Describe the difference between the security and privacy of data”

  • Security of data is preventing loss or corruption of data

  • Privacy is protecting data against unauthorised access

2
New cards

“Explain the difference between data security and data integrity”

  • Data integrity is ensuring consistency and accuracy of data

  • Data security is preventing loss or corruption of data

3
New cards

“Explain why a school needs to keep both its data and its computer system secure from unauthorised access”

  • Data needs protecting from someone deleting/taking it

  • Computer system needs protecting to stop people for example, installing malware or damaging the system

4
New cards

“State why data needs to be kept secure”

  • To stop data from being lost/corrupted

  • To make sure it can be recovered

  • To prevent unauthorised access

5
New cards

“State the meaning of privacy of data”

  • Prevent unauthorised access of data

  • Ensure data can only be accessed by authorised persons

6
New cards

“State the meaning of integrity of data”

  • Ensure the accuracy and consistency of data

  • Ensure data is up to date

7
New cards


“Identify a security method can be used to protect program code from unauthorised access during email transfer + explain how this method protects”

Encryption:

  • File contents are converted to cipher text

  • If intercepted, the data cannot be understood without the decryption key

8
New cards

“Identify and describe one method of restricting the risks posed by an unauthorised person intercepting the data whilst it is being transferred across the internet”

Encryption:

  • Data is encoded using a key to create cipher text

  • If intercepted it cannot be understood

  • Without being decrypted using a key

9
New cards

“Give other ways other than back-up software that data is stored in a computer to be kept secure”

  • Install a firewall

  • Up to date anti-virus/malware

  • Username and strong password

  • Encryption

  • Access rights

10
New cards

“Describe ways in which access rights can be used to protect the data in Javier’s database from unauthorised access”

  • Access rights give managers access to different elements

    • By having different accounts

    • Which have different access rights (read only, no access, read and write)

  • Specific views can be assigned to himself and other managers

    • Eg. managers can only see the data for their own shops

11
New cards

“Similarities between spyware and a virus”

  • Both are malicious software

  • Both are downloaded without the user’s knowledge

  • Both are embedded in other legitimate software when downloaded/try avoid firewall

  • Both run in the background

12
New cards

“Differences between spyware and a virus”

  • Virus can damage computer data, spyware only records/accesses data

  • Virus does not send data out of the computer, spyware sends recorded data to a third party

  • Virus replicates itself, spyware does not replicate itself

13
New cards

“Describe malware and state a security measure to protect against that threat”

  • Malicious software that replicates and can delete/damage data

  • Install and run anti-malware

14
New cards

“Describe hacker/unauthorised access and state a security measure to protect against that threat”

  • Illegal access in order to delete/damage data

  • Use a firewall/ strong passwords

15
New cards


“Describe spyware and state a security measure to protect against that threat”

  • Software installed on the computer without the user’s knowledge which records keystrokes and sends the data gathered about the user to a third party

  • Use a firewall/ install and run anti-spyware/ use a virtual (on screen) keyboard

16
New cards

“Describe viruses and state a security measure to protect against that threat”

  • Malicious software that replicates itself and can corrupt data

  • Anti-virus/ firewall/ anti-malware

17
New cards

“Describe hackers and state a security measure to protect against that threat”

  • Unauthorised access to the computer with malicious intent

  • Firewall/ strong or biometric passwords/ user permissions

18
New cards

“How can firewalls be used to protect computer systems”

  • Monitors incoming and outgoing traffic against criteria  and rejects any traffic that does not meet the set rules

19
New cards

“How can encryption be used to protect computer systems”

  • Ensures that if data is intercepted / obtained it cannot be understood without the decryption key

20
New cards

“How can passwords be used to protect computer systems”

  • Ensures only users with the correct password can access the resources // prevents unauthorised access

21
New cards

“Explain how a firewall can help protect the customer’s data”

  • Compares all incoming and outgoing transmissions against set criteria

  • Blocks all transmissions that do not meet rules

  • Blocks data from entering specific ports

  • Blocks unauthorised/unknown internal software transmitting data

22
New cards

“Proxy server to protect against hackers”

  • Prevents devices accessing the web server directly

  • Intercepts any requests

  • Forwards the request using its own IP address

  • Screens returning data before sending it to the user

23
New cards

“Method to keep files secure during transmission”

Encryption:

  • Encode data so it cannot be decrypted/understood without the key

24
New cards

“Firewall to keep files secure on computer”

  • Filter incoming transmissions and stop any that could be attempting unauthorised access

25
New cards

“Anti-malware to keep files secure on computer”

  • Find and delete or quarantine any malware that could delete the data/files

26
New cards

“Describe the implications of a hacker gaining access to the cake factory’s servers’

  • Can access confidential data

    • Can sell the recipes

    • Company can lose money

  • Can access the commands for the machines

    • Can stop the machines working

    • Can change what the machines are supposed to do

    • Can lose company money

27
New cards

“Explain how the company can protect its data against hackers”

  • Install and run firewall

    • Blocks signals that do not meet requirements

    • Keeps up-to-date

  • Strong passwords

    • More challenging to guess

  • Additional authentication required

    • Like biometrics

28
New cards

“Explain how a digital signature ensures the email is authentic"

  • Message put through hashing algorithm to produce digest

  • Digest encrypted with sender’s private key to produce digital signature

  • The signature can only be decrypted with matching sender’s public key

29
New cards

“Explain how a digital signature is used to authenticate a digital document during transmission over a network”

  • The sender hashes the document to produce a digest

  • The sender encrypts the digest to create the digital signature (private key of sender)

  • The message and the signature are sent to the receiver

  • The receiver decrypts the signature to reproduce the digest (public key of sender)

  • The receiver uses the same hashing algorithm on the document received to produce a second digest

  • The receiver compares this digest with the one from the digital signature

  • If both are the same, document is authentic

30
New cards

“Phishing email threat”

  • The email pretends to be from an official body

    • Persuading individuals to disclose private information

    • Requesting authentication by redirecting to an official website

31
New cards

“Similarity and difference between pharming and phishing”

Difference:

  • Pharming is malicious code that redirect to a fake website, phishing uses an email to prompt user action

  • Pharming is automatic, phishing requires user action

Similarity:

  • Both try obtain financial or personal information

  • Both are false representation of an official body

  • Both make use of fake websites

32
New cards

“Examples of threats to data posed by networks and the internet”

  • Malware

  • Hacking

  • Phishing

  • Pharming

33
New cards

Virus

Malicious software that replicates itself and deletes/alters files stored on a computer

34
New cards

Pharming

Malicious software installed on a computer which redirects user to a fake website to obtain personal data

Explore top notes

note
Ecce Romani ch. 1-12
Updated 1108d ago
0.0(0)
note
social security and ERISA
Updated 1217d ago
0.0(0)
note
DSAT
Updated 928d ago
0.0(0)
note
Arthritis Pain of the Elbow
Updated 1151d ago
0.0(0)
note
006 - Cell Membrane
Updated 855d ago
0.0(0)
note
Earth Science #1
Updated 1334d ago
0.0(0)
note
Economics Semester 2
Updated 1064d ago
0.0(0)
note
Ecce Romani ch. 1-12
Updated 1108d ago
0.0(0)
note
social security and ERISA
Updated 1217d ago
0.0(0)
note
DSAT
Updated 928d ago
0.0(0)
note
Arthritis Pain of the Elbow
Updated 1151d ago
0.0(0)
note
006 - Cell Membrane
Updated 855d ago
0.0(0)
note
Earth Science #1
Updated 1334d ago
0.0(0)
note
Economics Semester 2
Updated 1064d ago
0.0(0)

Explore top flashcards

flashcards
Periodic Table First 20
20
Updated 966d ago
0.0(0)
flashcards
APUSH Unit 5 Test
41
Updated 363d ago
0.0(0)
flashcards
Linked Review
34
Updated 943d ago
0.0(0)
flashcards
Histology practical exam
33
Updated 939d ago
0.0(0)
flashcards
Au restaurant
61
Updated 1271d ago
0.0(0)
flashcards
APUSH Period 9 vocabulary
56
Updated 1078d ago
0.0(0)
flashcards
Great expectations test 1
20
Updated 1126d ago
0.0(0)
flashcards
psych final study guide chap 5
91
Updated 850d ago
0.0(0)
flashcards
Periodic Table First 20
20
Updated 966d ago
0.0(0)
flashcards
APUSH Unit 5 Test
41
Updated 363d ago
0.0(0)
flashcards
Linked Review
34
Updated 943d ago
0.0(0)
flashcards
Histology practical exam
33
Updated 939d ago
0.0(0)
flashcards
Au restaurant
61
Updated 1271d ago
0.0(0)
flashcards
APUSH Period 9 vocabulary
56
Updated 1078d ago
0.0(0)
flashcards
Great expectations test 1
20
Updated 1126d ago
0.0(0)
flashcards
psych final study guide chap 5
91
Updated 850d ago
0.0(0)