Study

Protecting Data and Information.

  •   0%
  •  0     0     0

  • Why must organisations comply with the Data Protection Act (2018) / GDPR?
    To ensure personal data is handled fairly, securely, and with consent.
  • What is ransomware designed to do?
    Lock or encrypt files and demand payment for their release
  • Give one example of how malware can enter a system
    Through email attachments, downloads, infected USB drives, or malicious links
  • What is a digital certificate used for?
    o prove the identity of a website or organisation online. Example: HTTPS websites display a padlock symbol showing a valid certificate.
  • Name one consequence for an organisation that loses customer data.
    Financial penalties, loss of customer trust, or reputational damage.
  • What is the purpose of data backup?
    To create a copy of data that can be restored after loss or corruption
  • Give one example of physical access control.
    Locked doors, key cards, fingerprint scanners, or security guards
  • How does a firewall protect a network?
    It monitors and filters incoming and outgoing traffic based on security rules.
  • Give one example of a secure data transmission protocol
    HTTPS, SSL/TLS, or VPN
  • Why should employees be trained in data protection procedures?
    Human error is a common cause of data breaches; training reduces risk
  • What is meant by “two-factor authentication” (2FA)?
    Requiring two methods of identity verification, e.g. password + text code
  • How might an employee accidentally cause data loss?
    By deleting files, opening a phishing email, or misplacing a USB stick
  • What might happen if a company ignores data protection laws?
    It can face large fines or legal action from the ICO
  • How does access level control protect data?
    By limiting users to only the data and systems they need for their role
  • What law makes hacking a criminal offence in the UK?
    The Computer Misuse Act (1990)
  • Why is regular system updating important for data protection?
    Updates fix security vulnerabilities that attackers could exploit.
  • Give one example of a phishing scam
    A fake email pretending to be from a bank asking for login details
  • Explain one reason why encryption is important for data in transmission.
    It prevents hackers from reading data if intercepted