1.16- data security

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/19

Last updated 5:00 PM on 4/18/24
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

20 Terms

1
New cards

what security risks are there in modern computing?

  • outside access and manipulation of files

  • unauthorised reading or copying of files

  • corruption of files

  • loss or deliberate deleting of files.

2
New cards

what two categories can threats be broken into?

internal and external

3
New cards

what can internal threats be?

disgruntled employees, employee mistakes or incompetence and social engineering.

4
New cards

what can external threats be?

can be black hat hackers

5
New cards

what is integrity?

means guarding against improper information modification or destruction and includes ensuring information and authenticity

6
New cards

what is an issue for file integrity?

how files are managed when multiple users have access to them.

e.g. if multiple people save a file at the same time which file should be used? and the file may be corrupted

7
New cards

what processes are used to protect files and data?

complex passwords

specific steps that should be taken to secure access.

hard copies of files should be disposed off

8
New cards

what is a contingency plan?

plans that are tested and planned and maintained in case of a disaster

9
New cards

what things need to be involved before a disaster in a contingency plan

carrying out a risk analysis

putting in preventative measures staff training

10
New cards

what things need to be involved during a disaster in a contingency plan?

implementation of contingency plan to prevent further damage to data

beginning immediate recovery of data

11
New cards

what things need to be involved after a disaster in a contingency plan

purchasing replacement hardware

reinstalling software

restoring data from backups

12
New cards

13
New cards

what is a virus?

  • Spreads across a network through self-writing code, identifying routes to attach itself to the network as quick as possible.

14
New cards

what is a worm?

A worm is the same as a virus – but can travel on its own. it won’t stop on its own until it cannot get through a network anymore.

15
New cards

what is trojan?

  • Trojans are designed to mislead users with their intent.

  • They do not replicate themselves.

  • Usually will leave a backdoor route into the computer

16
New cards

what is ransomeware?

  • Scare-ware scares the user by threatening to infect their computer or even pretending that the computers are already infected

  • Ransomware deletes/encrypts files and can force users to pay to return the files. However, sometimes threat actors will just take the money

17
New cards

what is spyware?

  • Key presses are tracked and data is typically sent back to the hacker through the Internet

  • Used for identity fraud, user access – essentially gathering data

18
New cards

what is remote access software?

  • Computers infected with this can become “bots” – PCs that a hacker can control to perform an action.

  • The hacker can directly control all of these PCs to perform certain actions

19
New cards

what technical processes are there for protecting data?

  • Setting access levels and rights to certain files or data for certain employees, complexity of passwords

  • Separate workstations to servers – you wouldn’t have an employee’s workstation connected to everything else in the building.

  • encryption

  • Firewalls + Anti-viruses

20
New cards

what company processes are there for protecting data?

  • Practical considerations in the office, such as not eating or drinking near computers, not taking work home with memory sticks

  • Workstations kept behind key-fobbed doors – two factor authentication

Explore top notes

note
Ap World Unit 2
Updated 1249d ago
0.0(0)
note
Story Board Notes
Updated 1148d ago
0.0(0)
note
Heimler APUSH TP 5.7
Updated 461d ago
0.0(0)
note
3.3 US Presidency
Updated 1101d ago
0.0(0)
note
Reproductive Systems
Updated 1245d ago
0.0(0)
note
Ap World Unit 2
Updated 1249d ago
0.0(0)
note
Story Board Notes
Updated 1148d ago
0.0(0)
note
Heimler APUSH TP 5.7
Updated 461d ago
0.0(0)
note
3.3 US Presidency
Updated 1101d ago
0.0(0)
note
Reproductive Systems
Updated 1245d ago
0.0(0)

Explore top flashcards

flashcards
師說
55
Updated 294d ago
0.0(0)
flashcards
WH2 Quiz 1
68
Updated 1118d ago
0.0(0)
flashcards
Harrison History Chapter 2
76
Updated 560d ago
0.0(0)
flashcards
z subjunctive or indicative list
30
Updated 1103d ago
0.0(0)
flashcards
Gen psych exam 1 fall 2024
93
Updated 543d ago
0.0(0)
flashcards
SS chapters 10 & 11 vocab
29
Updated 29d ago
0.0(0)
flashcards
nse 9
33
Updated 872d ago
0.0(0)
flashcards
師說
55
Updated 294d ago
0.0(0)
flashcards
WH2 Quiz 1
68
Updated 1118d ago
0.0(0)
flashcards
Harrison History Chapter 2
76
Updated 560d ago
0.0(0)
flashcards
z subjunctive or indicative list
30
Updated 1103d ago
0.0(0)
flashcards
Gen psych exam 1 fall 2024
93
Updated 543d ago
0.0(0)
flashcards
SS chapters 10 & 11 vocab
29
Updated 29d ago
0.0(0)
flashcards
nse 9
33
Updated 872d ago
0.0(0)