Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

WJEC - CG1 - 1.9

Privacy & Security

QuestionAnswer
Why would data loss be bad for a business - Delays - Loss of business - Potential legal problems filed against or by the company
What are some primary causes of data loss - Hardware Fault - Software Failures - Human Error - Deliberate Human Damage - Environmental Effects (fire, floods hurricane)
What is the difference between accidental and malicious damage Accidental damage is damage to data without intent Malicious damage is damage to data with the intent being to damage the data
Describe some forms of accidental damage - Accidental deletion of records - Hardware Fault - Software Fault - Power loss - Inexperienced user mistakes
Describe some forms of malicious damage - A hacker deleting or changing files - A virus - A disgruntled employee (perhaps ex employee) taking revenge by deleting files or corrupting the system
How would you protect data from these issues - Passwords - Physical security (locks on server rooms) - Permission levels (Admin, user, guest etc) - Write Protection (Storage which cannot be altered only read and hidden) - Firewall, anti-virus, encryption
How could backing up data protect the data Copying the data or backing it up will ensure you always have a version of your system albeit slightly out of date is better then no data at all
What are some backup storage methods - Optical Disks - Hard Disk Drives - Magnetic Tape - Flash drives - Cloud Storage
Why are backups held off site If the data is held on site and there is a fire, the backups get destroyed along with the system. Off site back ups ensure the data is safe even if the original data is not.
Why are backups and backup systems tested continuously If the data that is backed up is corrupt the back up is useless If the backup system doesnt work properly, it will render all backups that have been created by the current backup system useless
A business uses a file server that has a large hard disk. Describe a suitable strategy for backing up the data and for restoring the data on the file server after a failure - backup storage (hard disk) - Regular back ups (daily perhaps) - Held in a secure area off site (storage facility with physical and software security) - Data loss can be rectified by the copying the backup data onto the system
Name 2-3 rights acts (computing oriented pls) DPA - Data Protection Act CMA - Computer Misuse Act Copyright, Design and Patents Act
How many data protection act principles are there eight
What are the DPA principles - Data is processed lawfully - Obtained for lawful needs - Relevant and not excessive - Accurate and up to date - Not kept longer then needed - Processed with individuals rights - Kept securely - Not transferred out the EU
What are the individuals Rights - View data stored about themselves - To have their data corrected or removed - To have damages compensated incase data is incorrect or unlawfully processed
What are some exemptions from the DPA - Data used for personal use - Data which may effect national security - Data used by authorities - Data to do with calculating wages, pensions, tax - Data used for distributing mail or other information
Some examples of the CMA - Computer misuse act - Manipulation of financial software - credit card fraud - Manipulation of personal record (criminal etc) - data sabotage - developing viruses - unlawful obtainment of data - Corporations lying about computer misuse to protect themselves
Some examples of violations to the Copyright, Design and Patents Act - Use cracked, pirated software (copying currently unlicensed software) - download texts, images or other data from the internet without the owners permission - Copying licensed software for use at home
Created by: delldom
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards