A-Level IT: Protecting Data

studied byStudied by 6 people
0.0(0)
Get a hint
Hint

What factors should be considered in keeping data safe and accurate?

1 / 53

54 Terms

1

What factors should be considered in keeping data safe and accurate?

  • Integrity (keeping it accurate and complete)

  • Security (keeping it safe from theft, misuse and damage)

New cards
2

What is malware?

Malicious software that damages computers.

New cards
3

What are some examples of types of malware?

  • Virus (software programs attaching to other programs)

  • Worm (uses computer networks to replicate itself)

  • Trojan horse (advertisements, cracked software or fake emails)

  • Ransomware (encrypts users’ files and asks for payment to decrypt)

  • Spyware

  • Denial of Service attack (sends lots of requests to a server to crash it)

  • Distributed Denial of Service attack (comes from multiple systems)

New cards
4

What are botnets?

Collections of internet-connected devices (zombies) that were infected and controlled by the owner of the botnet.

New cards
5

What are the effects of viruses?

  • Freezing

  • Crashing

  • Slower processing speed

  • Strange new programs/desktop icons

New cards
6

What are the effects of data loss from a virus?

Money can be spent restoring systems and files.

New cards
7

What is the difference between black-hat hackers and white-hat hackers?

Black-hat hackers write malware. White-hat hackers find weaknesses in systems with a company’s permission.

New cards
8

What is phishing?

Attacks designed to persuade users to type in personal information.

New cards
9

How do fraudsters commit identity fraud with users’ details?

  • Taking out mobile phone contracts

  • Opening bank accounts

  • Taking out credit cards

  • Applying for loans

New cards
10

How do people recognise identity fraud?

  • Receiving invoices for items they haven’t ordered

  • Receiving letters about debts that aren’t theirs

  • Being overdrawn at the bank

New cards
11

What are the effects of identity fraud?

  • Lack of bill payments

  • Bad credit ratings making it difficult to obtain mortgages

New cards
12

What are the impacts of ransomware?

  • Financial cost

  • Corrupted or damaged files

  • Loss of productivity for companies

New cards
13

Which factors are recommended for a strong password?

  • No personal details

  • Combination of lowercase and capital letters

  • Numbers and symbols

New cards
14

Why can using USB flash drives be a potential threat to systems and data?

They can carry malware or viruses, compromising the security of organisations and workplaces’ data.

New cards
15

What does BYOD stand for?

Bring Your Own Device.

New cards
16

What is BYOD?

A policy deciding when and how employees can use their own laptops on company networks to work and access data.

New cards
17

What are the advantages of BYOD?

It allows employees to work and gain resources anywhere.

New cards
18

Why may BYOD be a cause of concern to organisations?

Company data can be retrieved outside of the network and stolen or tampered with.

New cards
19

How can organisations using BYOD prevent risks to their data?

Organisations can encrypt data when storing it or transferring it to employees.

New cards
20

How does physical access control protect organisations’ data?

Companies can use keycards and databases to sort their employees into who is authorised to edit certain files or work in high-tier areas.

New cards
21

What does TLS stand for?

Transport Layer Security.

New cards
22

What does SSL stand for?

Secure Sockets Layer.

New cards
23

What do TLS and SSL certificates do?

Verify legitimate webpages upon user requests and indicate if they are secure or not.

New cards
24

What is the purpose of TLS and SSL protocols?

To verify encryption keys and prevent unwanted traffic from hackers by encrypting data when it is transferred.

New cards
25

What is the difference between one-way firewalls and two-way firewalls?

  • One-way firewalls protect systems from incoming threats

  • Two-way firewalls prevent malware from connecting to the internet

New cards
26

What is the purpose of firewalls?

To stop unwanted traffic from entering wireless connections and putting users’ data at risk.

New cards
27

What is the purpose of stateful packet inspection?

To check packets of information entering networks and verify if they are legitimate.

New cards
28

What is a virus definition database?

A database that helps antivirus software identify viruses by scanning downloaded files for definitions and detecting viruses in the ones that match.

New cards
29

What is plaintext?

The original message/string of data before encryption.

New cards
30

What is ciphertext?

An encrypted message/string of data.

New cards
31

What is encryption?

The process of converting plaintext to ciphertext.

New cards
32

What is the purpose of encryption?

To encode data so it cannot be read or stolen when transferred without a key to decrypt it.

New cards
33

What is the difference between private key encryption and public key encryption?

  • Private key encryption uses one key.

  • Public key encryption uses two separate keys.

New cards
34

What happens in private key encryption?

A key is transferred between communicated devices so they both understand how to pass messages.

New cards
35

What happens in public key encryption?

A public key, available to anyone, is used to encrypt a message for a recipient. A private key, available to only the recipient, is used to decrypt a message.

New cards
36

What does PGP stand for?

Pretty Good Privacy.

New cards
37

What is public key encryption used for?

SSL encryption of websites and PGP encryption of emails.

New cards
38

What does HTTP stand for?

Hypertext Transfer Protocol.

New cards
39

What does HTML stand for?

Hypertext Markup Language.

New cards
40

What is the purpose of HTTP?

It is a standard protocol used to access and receive webpages.

New cards
41

What is the purpose of HTTPS (Hypertext Transfer Protocol Secure)?

To secure data transmitted between web browsers and websites using encryption.

New cards
42

Secure HTTPS websites…

…use TLS and SSL certificates.

New cards
43

What are some examples of wireless protocols?

  • WEP (Wired Equivalent Privacy) - outdated, easy to bypass.

  • WPA / WPA2 (Wi-Fi Protected Access) - WPA2 is more secure and should be chosen.

  • WPA3 - announced in 2018 as the updated version of WPA2.

New cards
44

If software is not supported with security updates…

…it must be updated or replaced.

New cards
45

If operating systems and software are not updated…

…hackers could exploit their vulnerabilities.

New cards
46

How does antivirus software work?

It regularly updates a virus definition database. When files are downloaded it checks the program against known viruses or malware, then for types of actions that indicate a virus (heuristic analysis). If viruses are detected the files are quarantined or deleted.

New cards
47

What do real-time scans do?

Check downloaded files and email attachments before they are saved, copied, opened or run.

New cards
48

What do full scans do?

Check every file on a computer system to see if it is infected with viruses/malware. This can take hours.

New cards
49

What are the advantages of password managers?

  • Only one password needs to be remembered

  • Long, complicated passwords can’t be created

  • Passwords are randomised

  • Log-in screens can be filled automatically

New cards
50

What are the disadvantages of password managers?

If someone steals the main password, they have access to every password. This can be solved with two-factor authentication.

New cards
51

What are some methods of verifying passwords?

  • Asking users to input passwords twice

  • Asking for phone numbers or recovery emails and sending security codes to them

  • Using security questions (e.g. favourite colour/favourite food)

  • Asking for selected letters from passwords

  • Captchas

New cards
52

What are protocols?

Sets of rules that define common methods of data communication.

New cards
53

What do hashing algorithms do?

Use files or text to produce strings of characters (hashes), which can be compared to verify passwords and protect users from hacking attempts.

New cards
54

How do firewalls work?

Firewalls use software to enforce sets of rules to check incoming files and data. When they identify malicious traffic, they stop it from entering while allowing safe files in.

New cards

Explore top notes

note Note
studied byStudied by 7 people
... ago
5.0(1)
note Note
studied byStudied by 12 people
... ago
5.0(1)
note Note
studied byStudied by 21 people
... ago
4.0(1)
note Note
studied byStudied by 32 people
... ago
5.0(1)
note Note
studied byStudied by 8 people
... ago
5.0(1)
note Note
studied byStudied by 9 people
... ago
5.0(1)
note Note
studied byStudied by 31 people
... ago
5.0(1)
note Note
studied byStudied by 357 people
... ago
5.0(5)

Explore top flashcards

flashcards Flashcard (24)
studied byStudied by 21 people
... ago
5.0(1)
flashcards Flashcard (51)
studied byStudied by 28 people
... ago
4.0(1)
flashcards Flashcard (198)
studied byStudied by 7 people
... ago
5.0(1)
flashcards Flashcard (34)
studied byStudied by 2 people
... ago
5.0(1)
flashcards Flashcard (39)
studied byStudied by 4 people
... ago
5.0(1)
flashcards Flashcard (61)
studied byStudied by 379 people
... ago
4.6(28)
flashcards Flashcard (116)
studied byStudied by 13 people
... ago
5.0(1)
flashcards Flashcard (65)
studied byStudied by 2352 people
... ago
4.6(14)
robot