Unit 5 eSecurity Flashcards

(49 cards)

1
Q

Define personal data.

A

Personal data is any information that relates to an identified or identifiable living individual, such as name, address, email, IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Give three examples of personal data.

A

Examples: Name and surname, home address, email address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why should personal data be kept confidential?

A

To prevent identity theft, fraud, and misuse of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is encryption?

A

Encryption is the process of converting data into a coded form to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is anonymisation?

A

Anonymisation removes identifying details from data so individuals cannot be recognized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain two methods of keeping personal data secure.

A

Methods: Using firewalls to block unauthorized access; applying encryption to protect data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe the difference between anonymisation and pseudonymisation.

A

Anonymisation removes all identifiers permanently; pseudonymisation replaces identifiers with temporary codes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a firewall and how does it work?

A

A firewall monitors and filters incoming and outgoing network traffic to prevent unauthorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Explain two-factor authentication with an example.

A

Two-factor authentication uses two methods: something you know (password) and something you have (smart card).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

List three physical methods of preventing data misuse.

A

Examples: Locking devices, restricting access to servers, confidentiality agreements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compare advantages and disadvantages of using anti-virus software.

A

Advantage: Prevents malware infections; Disadvantage: May slow system performance and needs regular updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Explain how pharming works and suggest two prevention methods.

A

Pharming redirects users to fake websites by corrupting DNS or hosts file. Prevention: Use anti-virus software and verify URLs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe the differences between ransomware and scareware.

A

Ransomware locks data until payment is made; scareware tricks users into thinking their system is infected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Discuss three consequences of malware for organizations.

A

Consequences: Financial loss, data breaches, reputational damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Evaluate the effectiveness of penetration testing in preventing attacks.

A

Penetration testing identifies vulnerabilities before hackers exploit them, but requires skilled professionals and regular updates.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A hospital stores patient data online. Suggest five security measures to protect this data.

A

Measures: Encryption, firewalls, strong authentication, regular software updates, staff training.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A company suffers a phishing attack. Explain steps to prevent future attacks.

A

Steps: Implement anti-phishing software, educate employees, enforce strong password policies, use two-factor authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Design a security policy for employees to prevent misuse of personal data.

A

Policy: No sharing of passwords, lock screens when away, report suspicious emails, use secure networks, follow GDPR compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Describe three different types of authentication techniques.

A

Techniques: Passwords, smart cards, biometric data (fingerprints, iris scans).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Give two advantages and two disadvantages of using biometric authentication.

A

Advantages: High security, hard to replicate; Disadvantages: Expensive, privacy concerns.

21
Q

Define malware and give two examples.

A

Malware is malicious software designed to harm systems. Examples: Virus, Trojan horse.

22
Q

Explain how spyware works.

A

Spyware secretly collects user data such as keystrokes and sends it to hackers.

23
Q

What is ransomware and how can it be prevented?

A

Ransomware locks user data until payment is made. Prevention: Regular backups, anti-malware software.

24
Q

List four methods of preventing smishing.

A

Methods: Do not click unknown links, verify sender identity, use mobile security apps, block suspicious numbers.

25
Briefly describe two ways pharming attacks can be carried out.
Ways: Corrupting DNS server entries; modifying hosts file on the victim's computer.
26
What does GDPR stand for?
General Data Protection Regulation.
27
Give two reasons why software updates are important for security.
They patch vulnerabilities and improve protection against new threats.
28
What is phishing?
Phishing is a fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity via email or messages.
29
Define malware.
Malware is malicious software designed to damage, disrupt, or gain unauthorized access to systems.
30
Name two types of malware.
Examples: Virus, Trojan horse.
31
What is a strong password? Give one example.
A strong password is long, complex, and includes letters, numbers, and symbols. Example: P@ssw0rd!2025
32
What does two-factor authentication mean?
It means using two different methods to verify identity, such as a password and a code sent to a phone.
33
Explain the difference between phishing and smishing.
Phishing uses emails to trick users; smishing uses SMS messages.
34
How does a Trojan horse differ from a worm?
A Trojan horse disguises as legitimate software; a worm self-replicates and spreads without user action.
35
Why is encryption important when sending data over the internet?
It ensures data cannot be read by unauthorized parties during transmission.
36
Describe how a firewall protects a network.
A firewall filters incoming and outgoing traffic based on security rules to block unauthorized access.
37
Give two examples of biometric authentication.
Examples: Fingerprint scanning, facial recognition.
38
Explain why penetration testing is useful for organizations.
It identifies vulnerabilities before attackers exploit them, improving security posture.
39
How does ransomware typically spread?
It spreads through malicious email attachments, infected websites, or software vulnerabilities.
40
Scenario: A school stores student records on a cloud server. Suggest five security measures to protect this data.
Measures: Encrypt data, use strong passwords, enable two-factor authentication, perform regular backups, train staff on security policies.
41
Scenario: A company experiences a ransomware attack. Explain immediate steps to recover and prevent future attacks.
Steps: Disconnect infected systems, restore from backups, update security software, educate staff, implement network segmentation.
42
Scenario: A hospital needs to comply with GDPR. Outline three key requirements they must follow.
Requirements: Obtain consent for data use, allow data access and deletion requests, ensure secure storage and transmission.
43
Scenario: An employee receives a suspicious email asking for login details. What should they do and why?
Do not click links, report to IT department, verify sender identity; prevents phishing attacks.
44
Scenario: A bank wants to implement biometric authentication. Discuss two benefits and two drawbacks.
Benefits: High security, hard to replicate; Drawbacks: Costly, privacy concerns.
45
Scenario: A university network is targeted by a worm. Suggest three preventive measures.
Measures: Install anti-virus software, apply regular patches, restrict network access with firewalls.
46
Scenario: A retail company wants to prevent smishing attacks. Recommend four actions.
Actions: Educate employees, block suspicious numbers, use mobile security apps, verify sender identity before responding.
47
Scenario: A government agency needs to secure sensitive data during transmission. What method should they use and why?
Method: Use strong encryption protocols (e.g., AES) to ensure data confidentiality and integrity.
48
Scenario: A business plans to allow remote work. Suggest five security measures for remote employees.
Measures: VPN usage, strong passwords, two-factor authentication, updated anti-virus software, secure Wi-Fi connections.
49
Scenario: A healthcare provider wants to prevent phishing attacks. Suggest three strategies.
Strategies: Implement anti-phishing filters, conduct staff training, enforce strict email verification policies.