Define personal data.
Personal data is any information that relates to an identified or identifiable living individual, such as name, address, email, IP address.
Give three examples of personal data.
Examples: Name and surname, home address, email address.
Why should personal data be kept confidential?
To prevent identity theft, fraud, and misuse of sensitive information.
What is encryption?
Encryption is the process of converting data into a coded form to prevent unauthorized access.
What is anonymisation?
Anonymisation removes identifying details from data so individuals cannot be recognized.
Explain two methods of keeping personal data secure.
Methods: Using firewalls to block unauthorized access; applying encryption to protect data.
Describe the difference between anonymisation and pseudonymisation.
Anonymisation removes all identifiers permanently; pseudonymisation replaces identifiers with temporary codes.
What is a firewall and how does it work?
A firewall monitors and filters incoming and outgoing network traffic to prevent unauthorized access.
Explain two-factor authentication with an example.
Two-factor authentication uses two methods: something you know (password) and something you have (smart card).
List three physical methods of preventing data misuse.
Examples: Locking devices, restricting access to servers, confidentiality agreements.
Compare advantages and disadvantages of using anti-virus software.
Advantage: Prevents malware infections; Disadvantage: May slow system performance and needs regular updates.
Explain how pharming works and suggest two prevention methods.
Pharming redirects users to fake websites by corrupting DNS or hosts file. Prevention: Use anti-virus software and verify URLs.
Describe the differences between ransomware and scareware.
Ransomware locks data until payment is made; scareware tricks users into thinking their system is infected.
Discuss three consequences of malware for organizations.
Consequences: Financial loss, data breaches, reputational damage.
Evaluate the effectiveness of penetration testing in preventing attacks.
Penetration testing identifies vulnerabilities before hackers exploit them, but requires skilled professionals and regular updates.
A hospital stores patient data online. Suggest five security measures to protect this data.
Measures: Encryption, firewalls, strong authentication, regular software updates, staff training.
A company suffers a phishing attack. Explain steps to prevent future attacks.
Steps: Implement anti-phishing software, educate employees, enforce strong password policies, use two-factor authentication.
Design a security policy for employees to prevent misuse of personal data.
Policy: No sharing of passwords, lock screens when away, report suspicious emails, use secure networks, follow GDPR compliance.
Describe three different types of authentication techniques.
Techniques: Passwords, smart cards, biometric data (fingerprints, iris scans).
Give two advantages and two disadvantages of using biometric authentication.
Advantages: High security, hard to replicate; Disadvantages: Expensive, privacy concerns.
Define malware and give two examples.
Malware is malicious software designed to harm systems. Examples: Virus, Trojan horse.
Explain how spyware works.
Spyware secretly collects user data such as keystrokes and sends it to hackers.
What is ransomware and how can it be prevented?
Ransomware locks user data until payment is made. Prevention: Regular backups, anti-malware software.
List four methods of preventing smishing.
Methods: Do not click unknown links, verify sender identity, use mobile security apps, block suspicious numbers.