1.1.5 Securing Data and Systems

Cards (90)

  • What are the types of threats to data stored on computer systems?

    Accidental damage and malicious damage
  • What is accidental damage in the context of data threats?

    Accidental damage refers to unintentional actions that lead to data loss or corruption.
  • What is an example of accidental damage to data?

    Accidentally overwriting a file or deleting a folder
  • How can forgetting to save changes affect data?

    It can result in the loss of recent modifications to the data.
  • What can cause data loss due to program errors?

    A program error can lead to data loss or corruption, making it unreadable.
  • What is a common example of accidental data loss?

    Leaving a laptop or storage device on the train
  • What natural disasters can lead to data loss?

    Floods and fire
  • What is malicious and deliberate damage to data?

    It involves intentional actions to harm or corrupt data, such as by a disgruntled employee.
  • What is a computer virus?

    A computer program designed to copy itself and corrupt information on a targeted system.
  • How does a traditional virus operate?

    It attaches itself to another file, which is called a vector.
  • What distinguishes worms from traditional viruses?

    Worms replicate themselves without needing to attach to another file.
  • What is malware?

    Malware is software designed to disrupt computer operation.
  • What is spyware?

    Software that collects data without the user's knowledge.
  • How do Trojans operate?

    Trojans appear useful but provide a backdoor for data theft.
  • What do keyloggers do?

    They steal inputted text and send it back to another computer.
  • What is social engineering in cybersecurity?

    It involves psychologically influencing people to reveal confidential information.
  • What is phishing?

    Deception to gather personal information by directing users to fake websites.
  • What is a brute force attack?

    It involves repeatedly trying combinations of usernames and passwords to gain access.
  • What is a dictionary attack?

    A type of brute force attack using a list of common passwords.
  • What is a Denial of Service (DoS) attack?

    It prevents access to systems by overwhelming them with requests.
  • What is the difference between DoS and DDoS attacks?

    DDoS uses a network of computers to overwhelm a system, while DoS comes from one computer.
  • What can hackers do after accessing a system?

    They can prevent access or steal data, often demanding ransom.
  • What does unauthorized access to information violate?

    It violates the UK’s Computer Misuse Act.
  • What is encryption?

    Encryption is the process of changing data into a non-readable format.
  • What is the Caesar cipher?

    A method of encryption that shifts letters in a message by a certain number.
  • How does symmetric encryption work?

    It uses the same key for both encryption and decryption.
  • What is a disadvantage of symmetric encryption?

    Patterns in the data can be identified, making it less secure.
  • What is asymmetric encryption?

    It uses a public key for encryption and a private key for decryption.
  • What is the RSA algorithm?

    It is a widely used asymmetric encryption algorithm.
  • What is the function of a firewall?

    A firewall monitors and controls incoming and outgoing network traffic.
  • What does anti-virus software do?

    It monitors for signs of virus infection and scans for known virus signatures.
  • What is heuristic scanning?
    It identifies suspicious features in new or unknown viruses.
  • What are hierarchical access levels?
    They assign different access levels to users based on their roles.
  • What is cyber resilience?
    It is the ability to prepare for and recover from cyber-attacks.
  • What are potential consequences of a cyber-attack on a company?

    Loss of data, damaged software, and loss of reputation.
  • What is the role of a boundary firewall?
    It provides a basic level of security by blocking external threats.
  • What is secure system configuration?
    It involves managing admin accounts, audit trails, and backup copies.
  • What is the purpose of access control?

    To restrict access to valuable data to only authorized personnel.
  • What is patch management?

    It ensures that the latest software updates are applied to all machines.
  • Why is staff training important in cybersecurity?

    It helps prevent data risks by educating staff on proper network use.