Save
YEAR 11 (done)
DigiTech Unit 1
1.1.5 Securing Data and Systems
Save
Share
Learn
Content
Leaderboard
Share
Learn
Created by
Lucas Stone
Visit profile
Cards (90)
What are the types of
threats
to data stored on computer systems?
Accidental
damage and
malicious
damage
View source
What is accidental damage in the context of
data threats
?
Accidental damage
refers to
unintentional
actions that lead to data loss or corruption.
View source
What is an example of
accidental
damage to data?
Accidentally
overwriting
a file or
deleting
a folder
View source
How can forgetting to save changes affect
data
?
It can result in the loss of recent
modifications
to the data.
View source
What can cause data loss due to
program errors
?
A program error can lead to data loss or
corruption
, making it unreadable.
View source
What is a common example of
accidental data loss
?
Leaving a
laptop
or
storage device
on the
train
View source
What
natural disasters
can lead to data loss?
Floods
and
fire
View source
What is
malicious
and
deliberate
damage to data?
It involves intentional actions to harm or corrupt data, such as by a
disgruntled
employee.
View source
What is a
computer virus
?
A computer
program
designed to copy itself and
corrupt
information on a targeted system.
View source
How does a traditional
virus
operate?
It attaches itself to another file, which is called a
vector
.
View source
What distinguishes worms from traditional
viruses
?
Worms
replicate
themselves without needing to attach to another file.
View source
What is
malware
?
Malware is
software
designed to disrupt computer operation.
View source
What is
spyware
?
Software
that collects data without the user's knowledge.
View source
How do
Trojans
operate?
Trojans appear useful but provide a
backdoor
for data theft.
View source
What do
keyloggers
do?
They steal
inputted
text and send it back to another computer.
View source
What is
social engineering
in
cybersecurity
?
It involves psychologically influencing people to reveal confidential information.
View source
What is
phishing
?
Deception to gather
personal
information by directing users to fake websites.
View source
What is a
brute force attack
?
It involves repeatedly trying
combinations
of usernames and passwords to gain access.
View source
What is a
dictionary attack
?
A type of
brute force
attack using a list of common
passwords
.
View source
What is a
Denial of Service
(
DoS
) attack?
It prevents access to systems by overwhelming them with
requests
.
View source
What is the difference between
DoS
and
DDoS
attacks?
DDoS uses a
network
of computers to overwhelm a system, while DoS comes from one computer.
View source
What can
hackers
do after accessing a system?
They can prevent access or steal data, often demanding
ransom
.
View source
What does
unauthorized access
to information violate?
It violates the UK’s
Computer Misuse Act
.
View source
What is
encryption
?
Encryption is the
process
of changing data into a non-readable format.
View source
What is the
Caesar cipher
?
A
method
of
encryption
that shifts letters in a message by a certain number.
View source
How does
symmetric encryption
work?
It uses the same key for both encryption and
decryption
.
View source
What is a disadvantage of
symmetric encryption
?
Patterns
in the data can be identified, making it less secure.
View source
What is
asymmetric encryption
?
It uses a
public key
for encryption and a
private key
for decryption.
View source
What is the
RSA algorithm
?
It is a widely used
asymmetric encryption
algorithm.
View source
What is the function of a
firewall
?
A firewall monitors and controls
incoming
and
outgoing
network traffic.
View source
What does
anti-virus software
do?
It monitors for signs of
virus infection
and scans for known virus
signatures
.
View source
What is heuristic scanning?
It identifies suspicious features in new or unknown
viruses
.
View source
What are hierarchical access levels?
They assign different access levels to
users
based on their
roles
.
View source
What is cyber resilience?
It is the ability to prepare for and recover from
cyber-attacks
.
View source
What are potential consequences of a
cyber-attack
on a company?
Loss of data, damaged
software
, and loss of
reputation
.
View source
What is the role of a boundary firewall?
It provides a basic level of security by blocking
external threats
.
View source
What is secure system configuration?
It involves managing
admin accounts
,
audit trails
, and
backup copies
.
View source
What is the purpose of
access control
?
To restrict access to valuable data to only
authorized
personnel.
View source
What is
patch management
?
It ensures that the latest
software updates
are applied to all machines.
View source
Why is staff training important in
cybersecurity
?
It helps prevent
data risks
by educating staff on proper
network use
.
View source
See all 90 cards