A-Level IT: Protecting Data

5.0(1)
studied byStudied by 7 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/53

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

54 Terms

1
New cards

What factors should be considered in keeping data safe and accurate?

  • Integrity (keeping it accurate and complete)

  • Security (keeping it safe from theft, misuse and damage)

2
New cards

What is malware?

Malicious software that damages computers.

3
New cards

What are some examples of types of malware?

  • Virus (software programs attaching to other programs)

  • Worm (uses computer networks to replicate itself)

  • Trojan horse (advertisements, cracked software or fake emails)

  • Ransomware (encrypts users’ files and asks for payment to decrypt)

  • Spyware

  • Denial of Service attack (sends lots of requests to a server to crash it)

  • Distributed Denial of Service attack (comes from multiple systems)

4
New cards

What are botnets?

Collections of internet-connected devices (zombies) that were infected and controlled by the owner of the botnet.

5
New cards

What are the effects of viruses?

  • Freezing

  • Crashing

  • Slower processing speed

  • Strange new programs/desktop icons

6
New cards

What are the effects of data loss from a virus?

Money can be spent restoring systems and files.

7
New cards

What is the difference between black-hat hackers and white-hat hackers?

Black-hat hackers write malware. White-hat hackers find weaknesses in systems with a company’s permission.

8
New cards

What is phishing?

Attacks designed to persuade users to type in personal information.

9
New cards

How do fraudsters commit identity fraud with users’ details?

  • Taking out mobile phone contracts

  • Opening bank accounts

  • Taking out credit cards

  • Applying for loans

10
New cards

How do people recognise identity fraud?

  • Receiving invoices for items they haven’t ordered

  • Receiving letters about debts that aren’t theirs

  • Being overdrawn at the bank

11
New cards

What are the effects of identity fraud?

  • Lack of bill payments

  • Bad credit ratings making it difficult to obtain mortgages

12
New cards

What are the impacts of ransomware?

  • Financial cost

  • Corrupted or damaged files

  • Loss of productivity for companies

13
New cards

Which factors are recommended for a strong password?

  • No personal details

  • Combination of lowercase and capital letters

  • Numbers and symbols

14
New cards

Why can using USB flash drives be a potential threat to systems and data?

They can carry malware or viruses, compromising the security of organisations and workplaces’ data.

15
New cards

What does BYOD stand for?

Bring Your Own Device.

16
New cards

What is BYOD?

A policy deciding when and how employees can use their own laptops on company networks to work and access data.

17
New cards

What are the advantages of BYOD?

It allows employees to work and gain resources anywhere.

18
New cards

Why may BYOD be a cause of concern to organisations?

Company data can be retrieved outside of the network and stolen or tampered with.

19
New cards

How can organisations using BYOD prevent risks to their data?

Organisations can encrypt data when storing it or transferring it to employees.

20
New cards

How does physical access control protect organisations’ data?

Companies can use keycards and databases to sort their employees into who is authorised to edit certain files or work in high-tier areas.

21
New cards

What does TLS stand for?

Transport Layer Security.

22
New cards

What does SSL stand for?

Secure Sockets Layer.

23
New cards

What do TLS and SSL certificates do?

Verify legitimate webpages upon user requests and indicate if they are secure or not.

24
New cards

What is the purpose of TLS and SSL protocols?

To verify encryption keys and prevent unwanted traffic from hackers by encrypting data when it is transferred.

25
New cards

What is the difference between one-way firewalls and two-way firewalls?

  • One-way firewalls protect systems from incoming threats

  • Two-way firewalls prevent malware from connecting to the internet

26
New cards

What is the purpose of firewalls?

To stop unwanted traffic from entering wireless connections and putting users’ data at risk.

27
New cards

What is the purpose of stateful packet inspection?

To check packets of information entering networks and verify if they are legitimate.

28
New cards

What is a virus definition database?

A database that helps antivirus software identify viruses by scanning downloaded files for definitions and detecting viruses in the ones that match.

29
New cards

What is plaintext?

The original message/string of data before encryption.

30
New cards

What is ciphertext?

An encrypted message/string of data.

31
New cards

What is encryption?

The process of converting plaintext to ciphertext.

32
New cards

What is the purpose of encryption?

To encode data so it cannot be read or stolen when transferred without a key to decrypt it.

33
New cards

What is the difference between private key encryption and public key encryption?

  • Private key encryption uses one key.

  • Public key encryption uses two separate keys.

34
New cards

What happens in private key encryption?

A key is transferred between communicated devices so they both understand how to pass messages.

35
New cards

What happens in public key encryption?

A public key, available to anyone, is used to encrypt a message for a recipient. A private key, available to only the recipient, is used to decrypt a message.

36
New cards

What does PGP stand for?

Pretty Good Privacy.

37
New cards

What is public key encryption used for?

SSL encryption of websites and PGP encryption of emails.

38
New cards

What does HTTP stand for?

Hypertext Transfer Protocol.

39
New cards

What does HTML stand for?

Hypertext Markup Language.

40
New cards

What is the purpose of HTTP?

It is a standard protocol used to access and receive webpages.

41
New cards

What is the purpose of HTTPS (Hypertext Transfer Protocol Secure)?

To secure data transmitted between web browsers and websites using encryption.

42
New cards

Secure HTTPS websites…

…use TLS and SSL certificates.

43
New cards

What are some examples of wireless protocols?

  • WEP (Wired Equivalent Privacy) - outdated, easy to bypass.

  • WPA / WPA2 (Wi-Fi Protected Access) - WPA2 is more secure and should be chosen.

  • WPA3 - announced in 2018 as the updated version of WPA2.

44
New cards

If software is not supported with security updates…

…it must be updated or replaced.

45
New cards

If operating systems and software are not updated…

…hackers could exploit their vulnerabilities.

46
New cards

How does antivirus software work?

It regularly updates a virus definition database. When files are downloaded it checks the program against known viruses or malware, then for types of actions that indicate a virus (heuristic analysis). If viruses are detected the files are quarantined or deleted.

47
New cards

What do real-time scans do?

Check downloaded files and email attachments before they are saved, copied, opened or run.

48
New cards

What do full scans do?

Check every file on a computer system to see if it is infected with viruses/malware. This can take hours.

49
New cards

What are the advantages of password managers?

  • Only one password needs to be remembered

  • Long, complicated passwords can’t be created

  • Passwords are randomised

  • Log-in screens can be filled automatically

50
New cards

What are the disadvantages of password managers?

If someone steals the main password, they have access to every password. This can be solved with two-factor authentication.

51
New cards

What are some methods of verifying passwords?

  • Asking users to input passwords twice

  • Asking for phone numbers or recovery emails and sending security codes to them

  • Using security questions (e.g. favourite colour/favourite food)

  • Asking for selected letters from passwords

  • Captchas

52
New cards

What are protocols?

Sets of rules that define common methods of data communication.

53
New cards

What do hashing algorithms do?

Use files or text to produce strings of characters (hashes), which can be compared to verify passwords and protect users from hacking attempts.

54
New cards

How do firewalls work?

Firewalls use software to enforce sets of rules to check incoming files and data. When they identify malicious traffic, they stop it from entering while allowing safe files in.