Chapter 13 Flashcards

(23 cards)

1
Q

What is GDPR?

A

A general data protection regulations introduced throughout the EU in 2018.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does GDPR detail the following principles about data?

A

Used to fairly lawfully and transparently
Purpose limitation
Data minimisation
Accuracy
Storage limitation
Integrity and confidentiality
Accountability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is accountability?

A

Ability to prove that the regulations are being complied with

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is integrity and confidentiality?

A

Handled in a way that ensures appropriate security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is storage limitation?

A

Kept for no longer than necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is data minimisation?

A

Used in a way that adequate relevant and limited to only what is necessary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is purpose limitation?

A

Use for specific explicit purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What happens if an organisation fails to comply with the GDPR?

A

It can be fined
EU maximum - the higher of 20 million or 4% of annual global turnover
Uk maximum - the higher of 17.5 million or 4% of annual global turnover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the requirements of GDPR?

A

Report a breach to the relevant supervisory authority within 72 hours

If the breach is likely to result in a high risk of adversely affecting individual individuals rights and freedom, the organisation must inform those individuals asap

Records must be kept of any personal data breaches

Organisations should ensure that they have robust breach detection investigation and internal reporting procedures in place

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is data subject?

A

Refers to the identified or in identify or living individual to whom personal data relates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Data subjects have the right to what

A

 to find out what information the government and other organisation store about them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What information can the government and other organisation store about someone that they have the right to?

A

Being informed about how their data is being used
Access personal data
Have incorrect data updated
Have data erased
Stop or restrict the processing of their data
Data portability
Object to how their data is processed in certain circumstances

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is data security?

A

Data securities is concerned with keeping data safe from various hazards that could destroy or compromise it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What assets could destroy or compromise data?

A

Physical risk or human risks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the main risks to computer systems and the data they contain?

A

Physical damage
Human damage
Operational problems
Data corruption
Dated theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is cyber security?

A

The protection of Internet connected systems including hardware software and data from cyber attack

17
Q

What is a cyber attack?

A

A malicious and deliberate attempt by an individual organisation to breach the information system of another individual or organisation

18
Q

What are the risks of a cyber attack?

A

Malware
fishing
denial of service
man in the middle

19
Q

What is Malware

A

This is a software designed to cause damage to a single computer server or computer network.

These attacks may run into a computer on network in operable or grant attacker access so that they can control the system remotely

20
Q

What are types of malware?

A

Worms, viruses and Trojans

21
Q

What is fishing?

A

A technique by which cyber criminals craft emails to fall a target into taking some harmful action. The the recipient might be tricked into downloading Malwa that is disguised as an important document.

22
Q

What is denial of service?

A

A brute force method to try to stop online service from working properly. E.g. attackers might send so much traffic to a website or so many requests to a database that it overwhelmed the system’s ability to function making it unavailable to anyone

23
Q

What is man in the middle?

A

A method by which attack has managed to interpose our secretly between the user and a web service that they are trying to access for an example and it might have a Wi-Fi network