3 - Protecting Data: Tools Flashcards

(17 cards)

1
Q

What is anti-virus software?

A

Software that prevents, detects, and removes malware from devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is signature detection in anti-virus software?

A

Identifies malware by comparing patterns in malicious code to known signatures (like fingerprints).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is heuristic detection in anti-virus software?

A

Detects malware by monitoring program behavior for suspicious activity, without requiring known signatures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Common features of anti-virus software?

A
  • Scheduled scans (HDD, folders, external storage)
  • On-access scanning when files are opened
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Limitations/implications of anti-virus software?

A
  • Must be regularly updated for new malware
  • Not 100% effective, cannot block hackers
  • Can slow PC and network performance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a firewall?

A

Monitors incoming and outgoing network traffic and blocks suspicious activity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is** packet filtering in firewalls**?

A

Inspects data packets against predefined security rules; blocks flagged packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Other firewall techniques?

A
  • Content filtering: Allows some traffic, blocks others
  • Program control: Controls which programs can access the LAN/Internet
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Limitations/implications of firewalls?

A
  • Can diminish network performance
  • Software firewalls slow systems if run 24/7
  • Cannot stop internal attacks
  • Viruses can alter firewall settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is encryption?

A

Converting data into a coded format to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Difference between data at rest and data in transit encryption?

A

Data at rest: Stored data; uses symmetric (private key) encryption

Data in transit: Data sent over networks; uses asymmetric (public key) encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an encryption key?

A

A value (128 or 256 bits) applied to an encryption algorithm to encode/decode data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Implications of encryption?

A
  • Losing the encryption key = data lost forever
  • Sharing the key = security compromise
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Important legislation for data protection?

A
  • Data Protection Act/GDPR (2018): Regulates use and handling of personal data
  • Computer Misuse Act (1990): Protects against IT system damage and unauthorized access
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are codes of practice?

A

Guidelines to help businesses comply with laws; not legally binding.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Who enforces the Data Protection Act and GDPR?

A

The ICO (Information Commissioner’s Office); breaches can result in substantial fines.