1.16- data security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

Last updated 5:00 PM on 4/18/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

what security risks are there in modern computing?

  • outside access and manipulation of files

  • unauthorised reading or copying of files

  • corruption of files

  • loss or deliberate deleting of files.

2
New cards

what two categories can threats be broken into?

internal and external

3
New cards

what can internal threats be?

disgruntled employees, employee mistakes or incompetence and social engineering.

4
New cards

what can external threats be?

can be black hat hackers

5
New cards

what is integrity?

means guarding against improper information modification or destruction and includes ensuring information and authenticity

6
New cards

what is an issue for file integrity?

how files are managed when multiple users have access to them.

e.g. if multiple people save a file at the same time which file should be used? and the file may be corrupted

7
New cards

what processes are used to protect files and data?

complex passwords

specific steps that should be taken to secure access.

hard copies of files should be disposed off

8
New cards

what is a contingency plan?

plans that are tested and planned and maintained in case of a disaster

9
New cards

what things need to be involved before a disaster in a contingency plan

carrying out a risk analysis

putting in preventative measures staff training

10
New cards

what things need to be involved during a disaster in a contingency plan?

implementation of contingency plan to prevent further damage to data

beginning immediate recovery of data

11
New cards

what things need to be involved after a disaster in a contingency plan

purchasing replacement hardware

reinstalling software

restoring data from backups

12
New cards

13
New cards

what is a virus?

  • Spreads across a network through self-writing code, identifying routes to attach itself to the network as quick as possible.

14
New cards

what is a worm?

A worm is the same as a virus – but can travel on its own. it won’t stop on its own until it cannot get through a network anymore.

15
New cards

what is trojan?

  • Trojans are designed to mislead users with their intent.

  • They do not replicate themselves.

  • Usually will leave a backdoor route into the computer

16
New cards

what is ransomeware?

  • Scare-ware scares the user by threatening to infect their computer or even pretending that the computers are already infected

  • Ransomware deletes/encrypts files and can force users to pay to return the files. However, sometimes threat actors will just take the money

17
New cards

what is spyware?

  • Key presses are tracked and data is typically sent back to the hacker through the Internet

  • Used for identity fraud, user access – essentially gathering data

18
New cards

what is remote access software?

  • Computers infected with this can become “bots” – PCs that a hacker can control to perform an action.

  • The hacker can directly control all of these PCs to perform certain actions

19
New cards

what technical processes are there for protecting data?

  • Setting access levels and rights to certain files or data for certain employees, complexity of passwords

  • Separate workstations to servers – you wouldn’t have an employee’s workstation connected to everything else in the building.

  • encryption

  • Firewalls + Anti-viruses

20
New cards

what company processes are there for protecting data?

  • Practical considerations in the office, such as not eating or drinking near computers, not taking work home with memory sticks

  • Workstations kept behind key-fobbed doors – two factor authentication