Data Security Flashcards

(25 cards)

1
Q

Importance of data and information security to organisations (3)

A
  1. Safeguarding business operations
  2. Mitigating financial loss and reputational damage
  3. Compliance with legal obligations
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Safeguarding business operations

A

Reliable data and secure information systems allow an organisation to function without disruption.
Protecting against threats ensures business continuity and minimises downtime.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Mitigating financial loss and reputational damage

A

Data breaches or corruption can lead to direct financial costs (e.g., fraud, recovery expenses) and indirect costs through loss of customer
trust.
Reputational damage can reduce customer loyalty, partnerships, and market share.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Compliance with legal obligations

A

Organisations in Australia must comply with laws such as the Privacy Act 1988(Cwth), the Australian Privacy Principles (APPs) and Australian
Consumer Law to protect personal data.
Failure to do so can result in legal penalties, investigations, and corrective orders.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Effectiveness measures for data and information security strategies

A

CIA
Confidentiality
Integrity
Availibility

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Confidentiality

A

Only authorised people/systems can view the data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Integrity

A

Data is accurate, complete, and only changed in valid, authorised ways

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Availability

A

Data/systems are accessible and performant when needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of threats

A

Accidental
Deliberate
Event Based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accidental Threats

A

These are threats that are unintentional and unexpected.
* User Error
* Power loss (not event based)
* Hardware/Software malfunction
* Hardware loss
* Lack of security or knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Deliberate Threats

A

These are threats that are created to cause loss or damage to the data
or information system.
Malware
Phishing
Hacking
Denial of Service attacks (DoS)
Thief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

Designed to either damage, disrupt or gain unauthorised
access to an information system
incl. adware, bot, bug, keylogger, ransomware, rootkit, trojan, virus, worm and spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Event Based threats

A

Threat to data and information that is a result of a natural
event.
* This includes fires, flood, heatwaves, storms and earthquakes
* Power Surges are considered one type of event based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Security Controls

A

Is a measure designed to protect data and information form threats, either
accidental, deliberate or event based
Do not guarantee that the data and
information will be fully protected
Reduces the chances of unauthorised access and/or data loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

5 groups of security controls and procedures

A

Hardware Controls
Software Controls
Physical equipment
Procedures
Electronic measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hardware Security Controls

A

Are hardware-based measures that are used to protect data and
information
* Biometrics
* Uninterrupted Power Supply (UPS)
* Firewalls
* Network intrusion prevention systems (IPS)
* Backup servers and NAS devices

17
Q

Software Security Controls

A

Are software-based measures that are used to protect data and information.
* Usernames and passwords
* Access Logs
* Audit trails
* Access restrictions
* Encryption
* Firewalls
* System protection
* Security protocols
* Data Loss Prevention (DLP) Tools
* Two Factor authentication
* Security Information and Event Management (SIEM)

18
Q

Physical Equipment

A

Are physical measures that are used to protect data and information.
* Fences and gates
* Bars on windows
* Doors with locks using swipe cards, password touch pads, active badges, voice
recognition and biometrics
* Guards
* CCTV
* Security badge systems: Limit access to sensitive locations.
* Secure storage cabinets and safes: Store portable drives, backups, and
sensitive documents.
* Fire suppression systems

19
Q

Electrical Measures

A
  • Firewalls (software-based): Control traffic flow between networks.
  • Intrusion Detection Systems (IDS): Monitor for suspicious activity.
  • Network segmentation: Isolate sensitive systems from the rest of the network.
  • End-to-end encryption (E2EE): Prevents interception of transmitted data.
  • Automated alerts and monitoring dashboards: Notify security teams of anomalies in real-time.
  • Two-factor authentication (2FA) and biometric logins: Strengthen user verification.
  • Virtual Private Networks (VPNs): Secure remote access via encrypted connections.
  • Zoned security strategies
20
Q

Common Signs of intrusion

A
  • increased use of system resources
  • new software installed
  • changing passwords
  • sending of spam email
  • unknown applications requesting access
  • system protection software uninstalled
  • a device completing tasks by itself
    *changes to a web browser home page
21
Q

Other issues to consider regarding data security

A
  • Out of date software (old software can have security leaks/loopholes)
  • Digital signature (authentication technique)
  • Ethical hacking (identify weaknesses)
22
Q

Consequences for security failure

A
  • Loss of customer loyalty
  • Penalties and prosecution
  • Loss of trade secrets to competitors
  • Decline in stock market value
  • Loss of productivity
  • Inability to pay staff and suppliers
  • Loss of income
  • Costs, labour and disruptions to recreate data and repair or replace equipment
23
Q

Evaluation Criteria: Confidentiality

A
  • Unauthorized Access Prevention: Does the strategy effectively block
    unauthorized individuals from accessing sensitive data?
  • Data Leakage: Is there evidence of data leaks or breaches?
  • Encryption: Is data properly encrypted both at rest and in transit?
  • Access Controls: Are access permissions properly managed, and is access
    restricted to only authorized personnel?
  • Data Minimization: Is only the necessary data collected and retained?
24
Q

Evaluation criteria: Integrity

A
  • Data Tampering: Is data protected from being altered, deleted, or corrupted by
    malicious actors?
  • Data Accuracy: Are there mechanisms for data validation and verification to ensure
    accuracy?
  • Audit Trails: Are comprehensive logs and audit trails maintained to track data
    changes?
  • Version Control: Does the system support data versioning to detect unauthorized
    changes?
  • Error Handling: Are effective error-handling mechanisms in place to correct
    accidental data issues?
25
Evaluation Criteria: Availability
* System Uptime: What is the consistent uptime of critical systems and applications? * Downtime Incidents: How frequently do system failures or outages occur, and what is the duration of these incidents? * Redundancy and Failover: Are there redundant systems and failover mechanisms in place? * Backup and Recovery: Are regular data backups performed, and are recovery plans in place to restore data and systems after an event? * Disaster Recovery: Is there a robust disaster recovery and business continuity plan to minimize downtime during disruptions?