Course Overview Exam 2025
Questions and Answers 100% Pass
Data - ✔✔Unorganized facts that can be processed into meaningful information.
Information - ✔✔Processed data conveying specific meaning, & of substantial value.
Personal Data - ✔✔Minor personal details that can lead to susceptibility to financial,
emotional & physical damage.
Organizational Data - ✔✔Information belonging to commercial entities.
Commercial Data Breach - ✔✔Impacts include financial value, market value, credibility,
time loss, and costs.
Natural Threats - ✔✔Natural disasters / accidents that cannot be predicted or avoided.
User Error - ✔✔The biggest threat to data, often due to ignorance or accidental lapses.
Data Predators - ✔✔Individuals or entities that seek to exploit personal information of
value in the digital age.
Data Security - ✔✔The process of protecting information, & the infrastructure storing it,
from unauthorized access / misuse.
COPYRIGHT © 2025 BY GRACE AMELIA, ALL RIGHTS RESERVED 1
,Malicious Programs - ✔✔Viruses, worms, & spyware that infect 90% of the devices that
users connect to the Internet.
Zombies - ✔✔Compromised computers used to launch attacks.
Physical Security - ✔✔Protection against loss or theft of media such as laptops, data
cards, and phones.
Data Loss - ✔✔Potential losses that can occur due to a data compromise.
Backup - ✔✔A solution for data loss that involves storing important items in a remote
location.
Corporate Espionage - ✔✔Data thefts that target weak links in cyber security chains.
Social Engineering - ✔✔A common method of attackers that involves befriending
individuals to gain access to data.
Awareness - ✔✔Recommended practice to mitigate threats to data from oneself and
others.
CIA Triad - ✔✔Refers to the principles of confidentiality, integrity, and availability in
data security.
Data Security Threats - ✔✔Includes natural threats, user error, and threats from others.
Data Generation - ✔✔The process by which data is constantly created, including phone
numbers, map locations, and transactions.
Preparedness - ✔✔The act of preparing and preventing data loss through regular
scheduling and backup.
Legal Fees & Lawsuits - ✔✔Costs associated with data breaches that can impact
organizations.
COPYRIGHT © 2025 BY GRACE AMELIA, ALL RIGHTS RESERVED 2
,Remote Work Security - ✔✔Measures taken to secure data and communications while
working remotely.
Confidentiality of Data - ✔✔Concept of being known / accessible to ONLY Authorized
Users.
Integrity - ✔✔Security of Data. FUNCTION: ensuring info is accurate, complete,
reliable, & is in its original form.
Authenticity - ✔✔The truthfulness of the Origin of Data. FUNCTION: ensures claimed
source of Data is actually original source and not tampered with since creation.
Availability of Data - ✔✔Authorized user access at any point of time. FUNCTION:
ensures once a user captures the Data, it must make it available when they request it.
Nonrepudiation - ✔✔Process ensuring the accuracy of the Sender & Receiver of a
message. FUNCTION: ensures sender cannot deny having sent the message & the
recipient cannot deny having received it.
Financial Loss - ✔✔Systems Unavailable - COSTLY (enterprise = Sensitive Data / Home
= Bank/Credit card info).
Depleted Resources - ✔✔Drive space/memory/processor speed - PERFORMANCE
latency.
Identity Theft - ✔✔Process of stealing personal info w/ intent to use illegally.
Identity Fraud - ✔✔Actual usage of stolen PII in illegal activities.
Loss of Trust - ✔✔Breach disguised as Trusted Entity - MALICIOUS SOFTWARE.
Data Loss / Theft - ✔✔Public release - Organization / Individual damage
(REPUTATION).
COPYRIGHT © 2025 BY GRACE AMELIA, ALL RIGHTS RESERVED 3
, Misuse of Computer Resources - ✔✔Higher performance & Faster Internet = Reduced
Security.
Precaution - ✔✔Action taken in advanced to protect the system against Threats /
Dangers.
Precautionary Measures - ✔✔Installing & maintaining Antivirus program, Firewall
program, Strong Passwords, File/App DLs from ONLY Known & Trusted Sources,
Virus Scans regularly, System Updates regularly.
Maintenance - ✔✔Actions supporting precautionary measures & securing devices.
FUNCTION: check the efficacy of the precautionary measures & Update when required.
Sys. Maintenance Measures - ✔✔Backup Copies, Malware mgmt., Updating of firewall
& antivirus programs regularly, Sufficient Free Space & Memory, Regularly cleaned
CPU Cabin, Clear Browsing Caches.
Reaction - ✔✔Anticipation & planning the measures helping to restore the services.
Reaction Measures - ✔✔Turning OFF: computer Power Supply, Disconnecting:
computer from Network, Reinstalling: system Applications.
Data - ✔✔Any piece of information about an Object / Entity.
Information - ✔✔Nothing but processed Data.
Personal Information - ✔✔Used by attackers to cause financial, emotional, & physical
damage to users.
Commercial Data Breach - ✔✔Has considerably stronger implications other than the
obvious financial one.
Computer Security - ✔✔The protection of computing systems & the Data stored /
accessed.
COPYRIGHT © 2025 BY GRACE AMELIA, ALL RIGHTS RESERVED 4