security, privacy and data integrity

Cards (36)

  • Data Security
    Ensuring data is protected against loss and unauthorized access
  • Data Integrity
    Making sure that data is valid and does not corrupt after transmission
  • Data Privacy
    Ability to determine what data is shared with a third party
  • Data Security
    Protection of data on a computer system to prevent corruption of data and prevent hackers from using data
  • System Security
    Protection of the computer system to prevent access of viruses to the system and prevent hackers from entering your computer system
  • Data Security
    • Encryption
  • System Security
    • ID & Password
  • Threats to Computer & Data Security
    • Malware
    • Hacking
    • Phishing
    • Pharming
  • Malware
    Software intentionally designed to damage a computer or computer network, including Virus & Spyware
  • Virus
    Software that replicates itself by inserting a copy of itself into another piece of software, which may cause the computer to crash and can lead to deletion or corruption of data
  • Spyware
    Software that gathers information about users' online and offline activity, including accessed sites, applications, and downloaded files
  • Risk restriction for malware
    Ensure anti-virus and anti-spyware software is installed, regularly updated and run
  • Hacking
    Illegal access to a computer system that can lead to the deletion or corruption of data and identity theft
  • Risk restriction for hacking
    Use strong passwords and ensure firewall
  • Phishing
    Attempt through emails to obtain user's confidential data which can cause identity theft
  • Risk restriction for phishing
    Ignore suspicious mails and ensure firewall criteria include SPAM filters, blacklist, etc.
  • Pharming
    Redirects user to a fake website that appears legitimate to gain confidential data
  • Risk restriction for pharming
    Use a reliable ISP; check that links are genuine and ensure https is present in the URL
  • Computer System Security Measures
    • User Accounts and Passwords
    • Firewalls
    • Authentication
    • Anti-virus software
    • Encryption
  • User Accounts and Passwords
    Usernames & passwords to deny access to unauthorized users, with user-assigned privileges to prevent access to admin rights
  • Firewalls
    Hardware or software that filters information travelling between the computer system and the internet, making decisions about what to allow and block
  • Authentication
    Process of determining whether someone is who they claim to be, to prevent unauthorized access through log-on using digital signatures, passwords and biometric scans
  • Anti-virus software
    Runs in the background to detect & remove viruses by checking files for known malicious patterns
  • Encryption
    Conversion of data to code by encoding it, which doesn't stop illegal access but appears meaningless and requires decryption software to decode
  • Data Security Measures
    • Encryption
    • Access Rights to data (authorization)
    • Data Backup
    • Disk-mirroring strategy
  • Access Rights to data (authorization)

    Different users assigned different authorization levels which prevent them from accessing all data, increasing security
  • Data Backup
    An exact copy of an original piece of data in case the original is lost or corrupted, within the same computer system or at different site
  • Disk-mirroring strategy
    Real-time strategy that writes data to two or more disks at the same time, so if one fails, the other is still there to be read off of
  • Data Integrity
    Data validation and data verification help protect the integrity of data by checking whether the data entered is sensible and accurate, respectively
  • Data Validation Methods
    • Range check
    • Format check
    • Length check
    • Presence check
    • Existence check
    • Limit check
    • Check digit
  • Data Validation
    Checks if data entered is valid, but not its accuracy
  • Data Entry Verification Methods
    • Visual Check
    • Double Entry
  • Data Verification
    Checks data entered is accurate during data entry and data transfer
  • Data Transfer Verification Methods
    • Parity Check
    • Checksum Check
  • Parity Check
    Checks that the number of 1s in a byte is either an odd number or an even number, as agreed between communicating devices
  • Checksum Check
    Computer adds together all bytes being sent, and the checksum is calculated before and after data sent to detect if any bits are lost