Security, Privacy and Integrity

Descrição

Advanced Level (A- Level) Computer Science (Security, Privacy and Integrity) FlashCards sobre Security, Privacy and Integrity, criado por TS P em 13-11-2015.
TS P
FlashCards por TS P, atualizado more than 1 year ago
TS P
Criado por TS P aproximadamente 9 anos atrás
13
3

Resumo de Recurso

Questão Responda
Define data security, integrity and privacy. Data security: Making sure that data is protected against loss and unauthorised access Data Integrity: whether data is correct, consistent and valid Data privacy: Refers to the sharing and use of data (as agreed between the two parties)
Security measures for a computer/network? - Firewall - Public and Private Key - Proxy server - Authentication techniques: Digital Signatures, Account and Password, Biometrics
What three factors do authentication techniques rely on? Possession factor Inheritance factor Knowledge factor
Proxy vs Firewall? Proxy server: A computer that redirects the computer to another webpage when a disallowed website is accessed. Firewall: Hardware/software that inspects and blocks certain packages and ports
Forms of data security? Disk mirroring Data backup Access Levels (Authorisation) Encryption
What is disk mirroring? Disk mirroring is a form of data security where data is written simultaneously into two separate disks to ensure continuous availability
Types of Integrity checks? Validation Verification (data entry) Verification (data transfer)
Types of Validation Range check Length check Format check Presence check Check digit
What are the two categories for data verification? Data verification during transfer and data verification during data entry
Types of Verification for data entry Double Entry Proof Reading
Methods of data verification for data transmission? Parity bit Checksum
Briefly, what's a check-sum? By adding up all the binary values (i.e. finding the decimal value) and dividing them by a designated power of 2 number (e.g. 16), the remainder of this division becomes the checksum, and the sent bit pattern's checksum will be compared to the original bit pattern's checksum to see if any error has occured
What are the potential errors that can occur to stored data during data processing? Input error - error on entry or missing Viruses - as a result of file transfer, software downloads Procedure Operating errors - procedure causing programs to corrupt Transmission errors - error from Program Errors
What are digital signatures A mathematical technique that utilises private and public keys. Also provides information about origins and identity of electronic documents.

Semelhante

Computing Hardware - CPU and Memory
ollietablet123
SFDC App Builder 2
Parker Webb-Mitchell
Data Types
Jacob Sedore
Intake7 BIM L1
Stanley Chia
Software Processes
Nurul Aiman Abdu
Design Patterns
Erica Solum
CCNA Answers – CCNA Exam
Abdul Demir
Abstraction
Shannon Anderson-Rush
Spyware
Sam2
HTTPS explained with Carrier Pigeons
Shannon Anderson-Rush
Data Analytics
anelvr