Module 16 - Protecting Information Flashcards

1
Q

GDPR law in UK

A

Data Protection Act 2018

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is the ICO

A

information commissioner’s office, an independent authority set up to promote access to official information and to protect personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who does GDPR apply to

A

Any business or organisation which uses information for any business or non-household purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The EU directive which led to GDPR required that personal data be:

A
  • processed in a fair manner in accordance with all laws
  • collected and processed for a specific, clearly explained, legitimate purpose
  • recorded such that it is adequate, relevant and not excessive
  • recorded accurately
  • kept current
  • kept no longer than necessary
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Regarding their own personal data, EU citizens have what rights?

A
  • access to data collected about them
  • ability and right to correct, erase or block information
  • ability and right to object to all uses of data
  • ability and right to oppose automated decisions regarding them based on their data
  • judical remedy and compensation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Fine imposable for data breach

A

up to £17 mil or 4% of company’s global turnover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do companies have to do if there is a breach

A

report the breach to ICO within 72 hours

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of information is required to identify a user

A
  • something you have
  • something you know
  • something you are
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Firewalls

A

A group of systems which enforces an access-control policy between two networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Denial of service attack

A

A malicious attack with the intent of restricting the operation of the server. The goal of the attack is to flood the communication ports and memory of the target site to prevent receipt of legitimate messages and the service of legitimate requests for connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus attacks

A

Viruses are a program or a piece of code loaded onto the computer without the knowledge of the user and can also replicate themselves - uses all available memory and brings system to a halt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spyware

A

Malicious software designed to monitor or capture actions carried out by a valid computer user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Potential controls for spam

A
  • email authentication solutions e.g. digital signature recognition
  • policies and procedures to train staff
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Mutual aid pact

A

An agreement between two or more companies to share resources with one another in the case of a disaster

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Cold site

A

A company leases a space in a building site or warehouse and design it to hold computer equipment - the site is ready and waiting for a disaster to happen

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hot site

A

Fully functioning, fully equipped disaster recovery room. Recovery operations centre are rooms available at a hot site service. Mirroring is used to backup data.