security, privacy and data integrity

    Cards (36)

    • Data Security
      Ensuring data is protected against loss and unauthorized access
    • Data Integrity
      Making sure that data is valid and does not corrupt after transmission
    • Data Privacy
      Ability to determine what data is shared with a third party
    • Data Security
      Protection of data on a computer system to prevent corruption of data and prevent hackers from using data
    • System Security
      Protection of the computer system to prevent access of viruses to the system and prevent hackers from entering your computer system
    • Data Security
      • Encryption
    • System Security
      • ID & Password
    • Threats to Computer & Data Security
      • Malware
      • Hacking
      • Phishing
      • Pharming
    • Malware
      Software intentionally designed to damage a computer or computer network, including Virus & Spyware
    • Virus
      Software that replicates itself by inserting a copy of itself into another piece of software, which may cause the computer to crash and can lead to deletion or corruption of data
    • Spyware
      Software that gathers information about users' online and offline activity, including accessed sites, applications, and downloaded files
    • Risk restriction for malware
      Ensure anti-virus and anti-spyware software is installed, regularly updated and run
    • Hacking
      Illegal access to a computer system that can lead to the deletion or corruption of data and identity theft
    • Risk restriction for hacking
      Use strong passwords and ensure firewall
    • Phishing
      Attempt through emails to obtain user's confidential data which can cause identity theft
    • Risk restriction for phishing
      Ignore suspicious mails and ensure firewall criteria include SPAM filters, blacklist, etc.
    • Pharming
      Redirects user to a fake website that appears legitimate to gain confidential data
    • Risk restriction for pharming
      Use a reliable ISP; check that links are genuine and ensure https is present in the URL
    • Computer System Security Measures
      • User Accounts and Passwords
      • Firewalls
      • Authentication
      • Anti-virus software
      • Encryption
    • User Accounts and Passwords
      Usernames & passwords to deny access to unauthorized users, with user-assigned privileges to prevent access to admin rights
    • Firewalls
      Hardware or software that filters information travelling between the computer system and the internet, making decisions about what to allow and block
    • Authentication
      Process of determining whether someone is who they claim to be, to prevent unauthorized access through log-on using digital signatures, passwords and biometric scans
    • Anti-virus software
      Runs in the background to detect & remove viruses by checking files for known malicious patterns
    • Encryption
      Conversion of data to code by encoding it, which doesn't stop illegal access but appears meaningless and requires decryption software to decode
    • Data Security Measures
      • Encryption
      • Access Rights to data (authorization)
      • Data Backup
      • Disk-mirroring strategy
    • Access Rights to data (authorization)

      Different users assigned different authorization levels which prevent them from accessing all data, increasing security
    • Data Backup
      An exact copy of an original piece of data in case the original is lost or corrupted, within the same computer system or at different site
    • Disk-mirroring strategy
      Real-time strategy that writes data to two or more disks at the same time, so if one fails, the other is still there to be read off of
    • Data Integrity
      Data validation and data verification help protect the integrity of data by checking whether the data entered is sensible and accurate, respectively
    • Data Validation Methods
      • Range check
      • Format check
      • Length check
      • Presence check
      • Existence check
      • Limit check
      • Check digit
    • Data Validation
      Checks if data entered is valid, but not its accuracy
    • Data Entry Verification Methods
      • Visual Check
      • Double Entry
    • Data Verification
      Checks data entered is accurate during data entry and data transfer
    • Data Transfer Verification Methods
      • Parity Check
      • Checksum Check
    • Parity Check
      Checks that the number of 1s in a byte is either an odd number or an even number, as agreed between communicating devices
    • Checksum Check
      Computer adds together all bytes being sent, and the checksum is calculated before and after data sent to detect if any bits are lost
    See similar decks