Data Security and Integrity processes Flashcards

(22 cards)

1
Q

Define Hacking

A

Gaining unauthorised access to data/computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define Virus

A

a program which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define Trojan

A

a program designed to breach the security of a computer system while ostensibly performing some innocuous function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define Worm

A

a standalone malware computer program that replicates itself in order to spread to other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Spyware

A

software that enables a user to obtain information about another computer activities by transmitting data from their hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define Malware

A

software which is specifically designed to disrupt or damage a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Keylogger

A

a computer program that records every keystroke made by a
computer user, especially in order to gain fraudulent access to passwords and
other confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define Malicious damage

A

when a person intentionally sets out to corrupt or delete electronic files, data or software programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define Accidental damage

A

when a person unintentionally corrupts or deletes electronic
files, data or software programs. Loss of data leading to damage to company’s
reputation Loss of data leading to fines or prosecution / GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define Botnets

A

a network of private computers infected with malicious software and
controlled as a group without the owners’ knowledge, e.g. to send spam.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does Hardware failure lead to

A

loss of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does ID theft lead to

A

personal losses/fraud

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does levels of permitted access protect the security and integrity of data

A

certain users would have different/restricted
access to certain data or parts of the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Write-protect mechanisms protect the security and integrity of data

A

Write-protect mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How does Strong secure password protect the security and integrity of data

A

the organisation limits access to the network by ensuring that all authorised users have a strong secure password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How does access rights protect the security and integrity of data?

A

access to confidential files on the network is limited to authorised users only by assigning access rights to users that only allow certain users to access specified area of the network and/or specified files.

17
Q

How does Encryption protect the security and integrity of data?

A

hackers are prevented from reading the confidential files even they
gain access to it by encrypting the files Encryption – an encryption key is used
and known only by the organisation

18
Q

How does Firewall protect the security and integrity of data?

A

the servers would be protected with firewall software blocking / checking
all network traffic entering or leaving specified ports / stop programs accessing the
internet

19
Q

How does backups protect the security and integrity of data?

A

copies of data held in order to restore in the event of data loss

20
Q

How does antivirus software protect the security and integrity of data

A

regularly scans all files stored on them for possible infection by malware -
email server would be protected with antivirus software and all incoming emails would be scanned to see if attached files are infected

21
Q

How does Policies / Legislation software protect the security and integrity of data

A

relevant descriptions based on current legislation or company policies – all files accessed by a user are recorded in an activity log

22
Q

Describe contingency planning to recover from damage

A

During the disaster; the company should