chapter 8 Flashcards

(53 cards)

1
Q

What is the Data Protection Act (DPA)?

A

Laws designed to protect individuals and prevent incorrect/inaccurate data being stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

State one DPA principle.

A

Data must be fairly/ lawfully processed / Processed for stated purpose only / Adequate, relevant, not excessive / Accurate / Not kept longer than necessary / Kept secure / Not transferred without adequate protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is data protection legislation required?

A

Provides rules on using personal data / Regulates processing / Protects data subject’s rights / Prevents misuse by third parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is e-safety?

A

Being safe on the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give an e-safety rule for young children.

A

Use age-appropriate search engines / Only visit recommended websites / Use software to limit web access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give an e-safety rule for email.

A

Be careful with unknown senders / Never open unknown attachments / Type website addresses directly / Check sender’s address in header.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is hacking?

A

Gaining unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacking effect.

A

Can lead to identity theft / Data can be deleted, changed, or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How to avoid hacking?

A

Use firewalls / Use strong, frequently changed passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is phishing?

A

Email pretending to be trustworthy to steal personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Phishing effect.

A

Creator gains personal data / Can lead to fraud or identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How to avoid phishing?

A

ISP/web browsers filter emails / Be cautious with emails/attachments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Smishing vs. vishing.

A

Smishing uses SMS; Vishing uses voice calls/messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is pharming?

A

Malicious code redirecting user to fake website without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pharming effect.

A

Creator can gain credit/debit card details / Leads to fraud or identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How to avoid pharming?

A

Anti-spyware software / Be alert for website redirection clues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define malware.

A

Any malicious software designed to disrupt computer or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a computer virus?

A

Program that replicates, corrupts data, or uses memory to slow/crash computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is a worm?

A

Program that replicates by finding network vulnerabilities, clogging bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is spyware/keylogging?

A

Records all key presses and sends data to perpetrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a Trojan horse?

A

Malware disguised as harmless software (e.g., game).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is adware?

A

Program creating pop-up/banner adverts online.

23
Q

What is ransomware?

A

Malware encrypting data and demanding ransom for decryption.

24
Q

Anti-virus software function.

A

Protects against viruses / Scans with virus database / Alerts user / Removes/quarantines viruses.

25
Anti-malware software function.
Protects against advanced malware / Uses heuristic detection / Warns of threats / Removes malware.
26
What is shoulder surfing?
Watching/spying to obtain passwords, PINs, or data by direct observation.
27
How to reduce shoulder surfing?
Cover keypad / Sit with back to wall / Unclick 'show password' / Use biometrics / Use contactless.
28
What is card cloning?
Making an unauthorized digital copy of credit card data onto a blank card.
29
Biometrics definition.
Relies on unique human characteristics for identification.
30
Two biometric categories.
Physiological (fingerprint, retina) / Behavioural (signature, voice).
31
Biometrics advantage.
Improved security / Quicker authentication / Cannot be forgotten/lost.
32
Biometrics disadvantage.
Environment affects measurements / Not 100% accurate / May not recognise changed characteristics / Hygiene concerns.
33
What is encryption?
Method of securing data by scrambling it to make it meaningless.
34
Plain text vs. cipher text.
Plain text: data before encryption. Cipher text: data after encryption.
35
Symmetric vs. asymmetric encryption.
Symmetric: same key encrypts/decrypts. Asymmetric: public key encrypts, private key decrypts.
36
What is a digital certificate?
Digital form of identification authenticating a website's credentials.
37
Digital certificate purpose.
Ensure website is trusted/genuine / Verify company ownership / Share public key for encryption.
38
What is SSL?
Secure Sockets Layer - protocol for secure data transmission over internet (https, padlock).
39
What is TLS?
Transport Layer Security - more modern/secure version of SSL.
40
Firewall function.
Software/hardware examining traffic between computer and network; blocks data failing criteria.
41
Two-factor authentication factors.
Knowledge (PIN) / Possession (security token) / Inheritance (fingerprint).
42
Strong password rule.
At least 8 chars / Contains numbers & letters / Upper & lower case / Contains symbol / No personal details.
43
Authentication definition.
Process of verifying someone's claimed identity.
44
Authentication techniques.
User ID/password / Biometrics / Magnetic stripes / Smart cards / Physical tokens / Electronic tokens.
45
What is zero login?
Authentication by user behaviour (facial, voice, movements) with no manual input.
46
A company stores customer data. Which DPA principle requires them to state why they collect it?
Data must be processed for the stated purpose only.
47
How can a user identify a phishing email?
Check sender's actual address / Look for too-good-to-be-true offers / Avoid clicking links, type URL directly.
48
Why is a worm more dangerous to a network than a virus?
It self-replicates using network holes, clogging bandwidth and slowing the entire network.
49
What protection is best against ransomware?
Regular backups and anti-malware with heuristic detection.
50
A shop uses fingerprint scanners for staff logins. What type of biometric is this?
Physiological biometric.
51
Why is asymmetric encryption more secure for online shopping?
The public key encrypts data, but only the website's private key can decrypt it.
52
How does a firewall protect a home network?
Examines incoming/outgoing data and blocks traffic that doesn't meet security criteria.
53
Why should passwords be changed regularly?
To reduce the risk if a password is compromised without the user's knowledge.