Revision Questions sorted to Chapter 17 - 20 Stephen Doyle "Information Systems for You"

What do they mean with 'data cross linking' ? What is the danger of this?

What is the best way of ensuring that data transfer (e.g. data transmission via networks) between computer systems is done secure?

What is the difference between Data security and Data integrity? (Describe using examples would be best!)

Security

Describe all 7 common data protection legislation rules. *

Personal data can only be stored for registered purposes * Personal data should be kept up-to-date. * Personal data should not be kept longer than necessary. * Personal data should be protected for any improper use. * Individuals have to right to know if (and see) the data stored about them. * Nobody may hack into an information system in order to obtain or change data. * It's not allowed to copy software, without subscription and payment. *

Security

Describe one way government laws help to protect personal data held in a bank's customer files.

1. The law prohibits unauthorised access to the data. That means the data is and must be protected. * * 2. The law for sees, that the owner of stored data always has the right to know about the data stored. Customers need to be informed about the existence of (any) database. Unfortunately, many companies don't do so!

Security

Explain, using examples if appropriate: * Virus

Security

Mention 4 different ways of protecting data against physical damage / theft.

1. First of all make sure that you have data backup's ! * 2. Use a generation set of backup files (grandfather . . ) * 3. Make sure you have the backup's also saved at a different place * 4. Install locks, special keys, entry after code only etc. * 5. Protect the computers with fireproof doors etc. * 6. Install (infra-red) alarms * 7. Put the computers on the top floor of the building * 8. Make use of biometric access to the computers (fingerprint readers, chip card readers) * 9. Have passwords on all systems, (have them) change regularly *

Security

What is Computer fraud? * Decribe one example of fraud committed.

Security * Programming

What is a hacker, what is a cracker?

A cracker is a hacker turned bad&emdash;a malicious meddler who likes to sneak into sensitive, secured information. Hackers are very interesting people, obsessively into their computers, particularly the programming of them (as opposed to power users, who just use the programs). Journal-ists got confused and starting calling the people who break into security systems "hackers."

Security * Software

How can you protect a computer system against computer viruses?

A computer virus is software, usually a program written to self-replicate and transfer to other systems. It could e.g. be stored on a floppy disk and transfer itself to the hard disk (and you won't notice!) The program will then maybe delete or damage files. * * - install software that will scan for viruses * - install software that can kill (remove) scanned viruses * - disallow the use of floppy disks (or scan immediately and eject if a virus is found)) * - regularly scan your hard disk for viruses (automatically) * - set passwords on your system (especially if you allow users to dial in via a modem) * - don't copy software that is not legal bought * - be careful with cheap (shareware) games (they often come with viruses) * - if they connect to e.g. the Internet, big companies install "Fire-Walls", software that will detect all unallowed transactions. * - regularly make back-ups of all your files

Security * Software

What are File generations? *

It means that you keep a set of files, all of them in chronological order of time created. This method is used to backup important files and in case you will have to upload some of the old backup data you will have the opportunity of going 'back in time' if needed. One of you backup files could be destroyed or not in working order . . .

Security * Software

What is a computer virus?

A computer virus is software, usually a program written to self-replicate and transfer to other systems. It could e.g. be stored on a floppy disk and transfer itself to the hard disk (and you won't notice!) The program will then maybe delete or damage files. * A virus can also be part of a program (e.g. a Macro virus in a wordprocessor). * A virus can also be transmitted via a network (e.g. the Internet)

Software * Database

Personnel records in a large company are held on a computer file on disk and are processed by the computer. The key field in each record contains the employees payroll number. * A. What is a record?
B. What is the key field?
C. Give examples of cases where a record would need to be:
(i) deleted,
(ii) inserted,
(iii) amended.

A. * A record will store all information needed (stuctured in fields) to identify and describe one employee. * * B. * The key-field will be the field which allows to identify an employee directly. It will in most cases be a numerical field (e.g. employeee identification number). * * C. * We would need to delete a record when an emplyee is no longer working for the company. * We would need to insert a record, when a new worker joins the firm. * We would need to amend (to change or update) a record, when any field describing an emplyee needs to be changed. An emplyee might change his addres, his phone-number, change her name etc. etc.