Data and Datum

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the definition of Data/Datum?

To give or something given.

What is the lowest unit of information from which other measurements and analysis can be done?

Data/Datum

Data can be numbers, images, words, _____ or _____.

figures, facts, ideas

What serves as the backbone for analysis?

<p>Data/Datum</p> Signup and view all the answers

No question can be answered without the data.

<p>True (A)</p> Signup and view all the answers

Analyzation of the data often leads to some of the interferences which are very commonly called as the _____.

<p>Information</p> Signup and view all the answers

What type of data is original in nature, problem- or project-specific, and collected for serving in a particular purpose?

<p>Primary Data</p> Signup and view all the answers

What type of data is not topical or research specific and can be economically and quickly collected?

<p>Secondary Data</p> Signup and view all the answers

What type of data involves information a company already possesses and collects routinely?

<p>Internal Data</p> Signup and view all the answers

Data collected by Internal method is not always in tune and regard with the research operation's objectives.

<p>False (B)</p> Signup and view all the answers

What type of data is collected from individuals outside the company and serves as a useful research tool?

<p>External Data</p> Signup and view all the answers

What is the ability of an individual or group to seclude themselves or information about themselves?

<p>Privacy</p> Signup and view all the answers

What type of information might result in loss of advantage or level of security if revealed?

<p>Sensitive Information</p> Signup and view all the answers

What is non-sensitive information that is not released to the public called?

<p>Internal Information</p> Signup and view all the answers

What is information that has been approved for public access called?

<p>Public Information</p> Signup and view all the answers

What are the levels of information sensitivity, typically categorized from most to least restricted?

<p>Restricted, Confidential, Internal, Public</p> Signup and view all the answers

What security process covers all human-to-computer interactions requiring user registration and login?

<p>User authentication</p> Signup and view all the answers

What are the four general means (factors) of authenticating a user's identity?

<p>Something the individual knows, something the individual possesses, something the individual is (static biometrics), something the individual does (dynamic biometrics)</p> Signup and view all the answers

What authentication factor includes passwords, Personal Identification Numbers (PINs), and answers to prearranged questions?

<p>Something the Individual Knows</p> Signup and view all the answers

What authentication factor includes electronic keycards, smart cards, and physical keys (also known as tokens)?

<p>Something the Individual Possesses</p> Signup and view all the answers

What authentication factor involves recognition by fingerprint, retina, and face?

<p>Static Biometrics (Something the Individual Is)</p> Signup and view all the answers

What authentication factor involves recognition of voice patterns, handwriting characteristics, and typing rhythm?

<p>Dynamic Biometrics (Something the Individual Does)</p> Signup and view all the answers

What is the widely used user authentication method where the user provides a name/login and password?

<p>Password Authentication</p> Signup and view all the answers

What type of access control allows the owner of a resource to decide who can access it and what level of access they have?

<p>Discretionary Access Control (DAC)</p> Signup and view all the answers

What type of attack involves an attacker gaining access to the system password file and comparing the password hashes against hashes of common words or precomputed lists offline?

<p>Offline Dictionary Attack</p> Signup and view all the answers

What type of attack targets a specific account and involves submitting password guesses until the correct password is discovered?

<p>Specific Account Attack</p> Signup and view all the answers

What attack involves an attacker choosing a popular password and trying it, possibly combined with attempts to gain knowledge about the account holder?

<p>Popular Password Attack / Against a single user</p> Signup and view all the answers

What attack involves an attacker waiting until a logged-in workstation is unattended to gain unauthorized access?

<p>Workstation Hijacking</p> Signup and view all the answers

Users sometimes likely to write down passwords?

<p>Exploiting user mistakes</p> Signup and view all the answers

What common user mistake involves using similar credentials across different services or applications?

<p>Using similar passwords for many applications</p> Signup and view all the answers

If a password is communicated across a network to log on to a remote system, it is vulnerable to eavesdropping.

<p>Electronic Monitoring</p> Signup and view all the answers

What password cracking technique involves trying words from a large list (dictionary) against the password file?

<p>Dictionary Attacks</p> Signup and view all the answers

What password cracking technique uses pre-computed tables of hash values, often incorporating salts to speed up the cracking process?

<p>Using a Rainbow Table</p> Signup and view all the answers

User authentication only requires a username.

<p>False (B)</p> Signup and view all the answers

Password authentication authenticates the ID of the user logging in.

<p>True (A)</p> Signup and view all the answers

Discretionary Access Control allows the system to determine user privileges.

<p>False (B)</p> Signup and view all the answers

Offline password guessing represents a significant password vulnerability.

<p>True (A)</p> Signup and view all the answers

Workstation hijacking is an online password vulnerability.

<p>False (B)</p> Signup and view all the answers

Exploiting user mistakes is a password cracking technique.

<p>False (B)</p> Signup and view all the answers

Dictionary attacks and rainbow tables are password cracking techniques.

<p>True (A)</p> Signup and view all the answers

Flashcards

Datum/Data

The lowest unit of information for analysis. Can be numbers, images, or words.

Information

The result of analyzing data; provides understanding.

Primary Data

Original data collected for a specific purpose.

Secondary Data

Data that already exists and is collected for other research.

Signup and view all the flashcards

Privacy

The ability to keep oneself or information private.

Signup and view all the flashcards

Sensitive Information

Data that could cause harm if revealed.

Signup and view all the flashcards

User Authentication

Authentication through human-computer interactions that requires a user to register and log in to a system.

Signup and view all the flashcards

Four General Means of Authenticating User Identity

Something you know, something you have, something you are, and something you do.

Signup and view all the flashcards

Password Authentication

User provides username and password.

Signup and view all the flashcards

Discretionary Access Control (DAC)

Resource owner decides access levels.

Signup and view all the flashcards

Offline Dictionary Attack

Attacker gains access to password file and decrypts.

Signup and view all the flashcards

Specific Account Attack

Targeting a single user account with password guesses.

Signup and view all the flashcards

Popular Password Attack

Trying popular passwords against a user.

Signup and view all the flashcards

Workstation Hijacking

Attacker uses unattended, logged-in workstation.

Signup and view all the flashcards

Password Cracking Techniques

Dictionary and rainbow tables are examples of this.

Signup and view all the flashcards

Study Notes

  • To give or something given is Data/Datum.
  • The basic unit of information for measurements and analysis is Data/Datum.
  • Data can be numbers, images, words, figures, facts, or ideas.
  • The backbone for analysis is Data/Datum.
  • No question can be answered without data: TRUE.
  • Data analysis often leads to interferences commonly called Information.
  • Guesswork or opinions are not part of data analysis; it is based on Inference (Results).
  • Data that is original, problem/project-specific, collected for a particular purpose: Primary Data.
  • Data that isn't topical or research-specific and is economically and quickly collected: Secondary Data.
  • Primary data collection methods include Observation, Questionnaire/Interview Schedule, Experimentation, Stimulation, Interview Method, Projective Techniques.
  • Primary sources provide basic data, more expensive, more time to collect, more accurate, first hand data.
  • Data a company already has and collects routinely is Internal.
  • Data collected by internal methods isn't always in tune with research operations: FALSE.
  • Data collected directly from individuals is External.
  • Individuals' ability to seclude themselves or their information is Privacy.
  • Information that could cause loss of advantage or security: Sensitive Information.
  • Non-public information is Restricted.
  • Information that is not released to the public is considered Confidential.
  • Publicly available information is Internal.
  • Information approved for public access is Public.
  • The sensitivity of information levels are Restricted, Confidential, Internal and Public.
  • Human-to-computer interactions requiring registration and login are under User authentication.
  • The four means of authenticating a user's identity are: Individual Knows, Individual Possesses, Individual is (static biometrics), Individual does (dynamic biometrics).
  • Passwords, PINs, and answers to prearranged questions are examples of Individual Knows authentication.
  • Electronic keycards, smart cards, and physical keys are examples of Individual Possesses authentication.
  • Identifying fingerprints, retinas, and faces falls under Static Biometrics.
  • Identifying voice patterns, handwriting, and typing rhythm falls under Dynamic Biometrics.
  • Using a name/login and password for authentication is Password Authentication.
  • The type of access control that enables resource owners to decide who can access and at what level is Discretionary Access Control (DAC).
  • An attacker gaining access to a system password file and comparing password hashes is an Offline Dictionary Attack.
  • Targeting a specific account and submitting password guesses is a Specific Account Attack.
  • Choosing a popular password is a Popular Password Attack / Against a single user.
  • Waiting for a logged-in workstation to be unattended is an example of Workstation Hijacking.
  • Exploiting mistakes from user is an example of Exploiting User Mistakes.
  • Using similar passwords across many applications is Exploiting Multiple Passwords Use.
  • Communicating a password across a network to log into a remote system is Electronic Monitoring.
  • Creating a large dictionary of possible passwords is a Dictionary Attacks.
  • Pre-computing tables of hash values for all salts is Using A Rainbow Table.
  • User authentication requiring only a username is False.
  • Password authentication authenticates the user ID logging in: True.
  • The system is in charge of determining user privileges via Discretionary Access Control: False.
  • Offline password guessing is a password vulnerability: True.
  • Workstation hijacking is an online password vulnerability: False.
  • Exploiting user mistakes is password cracking: False.
  • Dictionary attacks and rainbow tables are password cracking techniques: True.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

Secondary Data Research
5 questions

Secondary Data Research

ComprehensiveExuberance5968 avatar
ComprehensiveExuberance5968
Data Analysis Basics
5 questions

Data Analysis Basics

CongratulatoryZeal avatar
CongratulatoryZeal
Primarni in Sekundarni Podatki
20 questions

Primarni in Sekundarni Podatki

BrainiestArlington9045 avatar
BrainiestArlington9045
Use Quizgecko on...
Browser
Browser