Busy. Please wait.

show password
Forgot Password?

Don't have an account?  Sign up 

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.

Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
remaining cards
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
restart all cards

Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

WJEC - CG1 - 1.9

Privacy & Security

Why would data loss be bad for a business - Delays - Loss of business - Potential legal problems filed against or by the company
What are some primary causes of data loss - Hardware Fault - Software Failures - Human Error - Deliberate Human Damage - Environmental Effects (fire, floods hurricane)
What is the difference between accidental and malicious damage Accidental damage is damage to data without intent Malicious damage is damage to data with the intent being to damage the data
Describe some forms of accidental damage - Accidental deletion of records - Hardware Fault - Software Fault - Power loss - Inexperienced user mistakes
Describe some forms of malicious damage - A hacker deleting or changing files - A virus - A disgruntled employee (perhaps ex employee) taking revenge by deleting files or corrupting the system
How would you protect data from these issues - Passwords - Physical security (locks on server rooms) - Permission levels (Admin, user, guest etc) - Write Protection (Storage which cannot be altered only read and hidden) - Firewall, anti-virus, encryption
How could backing up data protect the data Copying the data or backing it up will ensure you always have a version of your system albeit slightly out of date is better then no data at all
What are some backup storage methods - Optical Disks - Hard Disk Drives - Magnetic Tape - Flash drives - Cloud Storage
Why are backups held off site If the data is held on site and there is a fire, the backups get destroyed along with the system. Off site back ups ensure the data is safe even if the original data is not.
Why are backups and backup systems tested continuously If the data that is backed up is corrupt the back up is useless If the backup system doesnt work properly, it will render all backups that have been created by the current backup system useless
A business uses a file server that has a large hard disk. Describe a suitable strategy for backing up the data and for restoring the data on the file server after a failure - backup storage (hard disk) - Regular back ups (daily perhaps) - Held in a secure area off site (storage facility with physical and software security) - Data loss can be rectified by the copying the backup data onto the system
Name 2-3 rights acts (computing oriented pls) DPA - Data Protection Act CMA - Computer Misuse Act Copyright, Design and Patents Act
How many data protection act principles are there eight
What are the DPA principles - Data is processed lawfully - Obtained for lawful needs - Relevant and not excessive - Accurate and up to date - Not kept longer then needed - Processed with individuals rights - Kept securely - Not transferred out the EU
What are the individuals Rights - View data stored about themselves - To have their data corrected or removed - To have damages compensated incase data is incorrect or unlawfully processed
What are some exemptions from the DPA - Data used for personal use - Data which may effect national security - Data used by authorities - Data to do with calculating wages, pensions, tax - Data used for distributing mail or other information
Some examples of the CMA - Computer misuse act - Manipulation of financial software - credit card fraud - Manipulation of personal record (criminal etc) - data sabotage - developing viruses - unlawful obtainment of data - Corporations lying about computer misuse to protect themselves
Some examples of violations to the Copyright, Design and Patents Act - Use cracked, pirated software (copying currently unlicensed software) - download texts, images or other data from the internet without the owners permission - Copying licensed software for use at home
Created by: delldom