Section 1: Data Security
Data Security, Privacy, and Integrity.
Define Data Privacy.
The privacy of personal information stored on a computer, ensuring it is not accessed by unauthorized parties.
What is the primary purpose of Data Protection Laws?
To govern the privacy and security of data through specific regulations to ensure information about individuals or organizations remains private.
List four of the eight principles of Data Protection Laws.
Data must be processed fairly and lawfully.
Data processing is restricted to the stated purpose.
Data must be adequate, relevant, and not excessive.
Data should not be kept longer than necessary.
Define Data Security.
The measures taken to prevent data loss or corruption and the ability to recover it if it is lost or corrupted.
Describe the difference between the security and privacy of data.
Security protects data against loss.
Privacy protects data against unauthorised access.
Define Data Integrity.
The accuracy, completeness, and consistency of data.
Explain the difference between data security and data integrity.
Authentication & Access Control
How can data stored on a computer be kept secure?
What is a User Account in the context of security?
An agreement allowing an individual to use a computer or network server, often requiring a username and password to authenticate the user.
Explain how Access Rights are used.
The use of authorization levels to ensure only specific users see specific data; for example, a hospital cleaner might not have access to patient data, but a consultant would.
[Past Exam Q&A adds:]
From exam Q&A (database context):
• Different accounts / logins are set up, each with different access rights e.g. read only // no access // read/write.
• Specific views can be assigned to different users (e.g. managers can only see data for their own shop).
What are the requirements for a strong password?
What is a security token?
A small item of hardware provided to an individual user that confirms their identity.
What are examples of biometric authentication methods?
What is two-factor authentication (2FA)?
It is when two methods of authentication are used (usually one of them is a password) to authenticate a user.
State why data needs to be secure.
Encryption & Secure Protocols
Describe how a digital signature is used to authenticate a document.
What is encryption and what is its purpose?
Encryption is converting plain text (readable text) into cipher text (meaningless text) using an encryption key.
Its purpose is to prevent hackers from intercepting and understanding the data interepted maintaining data security.
It can be understood again after decryption using the decryption key.
Contrast SSL and TLS key lengths.
SSL typically uses a 128-bit key, while TLS uses a 256-bit key.
Describe the Handshake process when a browser connects to a secure website.
What is a Digital Cirtificate and when is it used?
If an incoming transmission is an email, there can be a concern about the authenticity of the email’s sender.
The solution is to insist on the sender attaching a digital ciertificate to the email.
The digital cirtificate can also be an electronic document confirming the identity and security-ability of a web page on the internet.
It is defined as an electronic document used to prove the ownership of a public key (used for encryption).