Security and Data Management

Cards (28)

  • What is network security?
    The measures to protect network data
  • What is encryption?
    Conversion of data into cyphertext
  • Why is compression used?
    To reduce file size and increase transfer speeds
  • What is a backup?
    A copy of data for recovery purposes
  • What is archiving?
    Storing data not in current use
  • What does cybersecurity protect against?
    Cyberattacks on computer systems
  • What is a cyberattack?
    An attempt to gain unauthorized data access
  • What is malware?
    Software enabling a cyberattack
  • What are vulnerabilities in software?
    Security flaws fixed by patches
  • What are cookies in web browsing?
    Data identifying a computer for websites
  • What measures control network security risks?
    • Limiting levels of access
    • Using strong passwords
    • Encryption
  • How is encryption demonstrated using the XOR operator?
    By converting original data to cyphertext
  • What does a Disaster Recovery Plan cover?
    Before: risk analysis, preventative measures, staff training
    During: staff response, contingency plans
    After: replacing hardware, reinstalling software, restoring data
  • What are the types of compression?
    • Lossless compression: no data loss
    • Lossy compression: some data discarded
  • What is the compression ratio formula?
    Compression ratio = Original size / Compressed size
  • Why is lossy compression used for multimedia?
    To reduce file size for streaming
  • What are the consequences of cyberattacks on businesses?
    Loss of reputation and potential business failure
  • What types of malware are used in cyberattacks?
    Viruses, spyware, and trojans
  • What are protections against malware?
    • Install anti-virus software
    • Use a firewall
    • Keep OS updated
    • Use latest browsers
    • Watch for phishing emails
  • What are common forms of cyberattacks?
    • Shoulder surfing
    • SQL Injection
    • Denial of Service (DoS)
    • Password attacks
    • IP Spoofing
    • Social engineering
  • What is shoulder surfing?
    Direct observation to obtain information
  • What is SQL Injection?
    Injecting commands to alter SQL statements
  • What is a Denial of Service (DoS) attack?
    Making a website unavailable to users
  • What are password attacks?
    Brute force or dictionary attacks for passwords
  • What is social engineering in cybersecurity?
    Deception to trick users into revealing data
  • What strategies identify vulnerabilities?
    • Footprinting
    • Ethical hacking
    • Penetration testing (targeted, internal, external, blind)
  • What is IP Spoofing?
    Changing IP address to mislead users
  • What is the secure by design approach?
    • Minimize vulnerabilities
    • Continuous testing
    • Adherence to best programming practices