Chapter 5: Keeping data safe and secure, keywords

Beschreibung

Relevent keywords to help revision.
Victoria Heppinstall
Karteikarten von Victoria Heppinstall, aktualisiert more than 1 year ago
Victoria Heppinstall
Erstellt von Victoria Heppinstall vor mehr als 7 Jahre
38
0

Zusammenfassung der Ressource

Frage Antworten
Archive A copy of a file kept away from the original and no longer in everyday use.
Backup A copy of a file in case of accidental or malicious loss of the original.
Data Raw facts and figures with no meaning. (eg. 011263)
Decryption Data is unscrambled by software using a key so that the data can be understood.
Encription Data is scrambled by software using a key so that the data cannot be understood by anyone viewing it.
Encryption/Decription key A password or PIN used to scramble/unscramble data.
Firewall Hardware or software security measure to control access to computer networks or systems, using rules set up by the user.
Hacking Accessing an ICT system without use of proper usernames or passwords; illegal hacking is unauthorised access.
Information Processed data put into context
Malware Malicious software that enters a computer system without the owner's consent and which harms the system.
Password A security measure to check the username is being used by the correct user.
Personal Data Data that can be used to identify you or provide information about you and your activities.
PINs Personal Identification Number: Four or more numbers used instead of a password.
Spyware Malicious software that sends details of data and activities of a computer system to others without knowledge of the owner of the system.
Trojan horse Malicious software that pretends to be a useful application but carries out other tasks.
Unauthorised User Someone who does not have permission to access or see the data.
Username This identifies a user to the ICT system so the system can allow them access.
Virus Malicious software that can replicate itself and cause harm to files by deleting, altering or by corrupting them.
Worm Malicious software that copies itself and uses networks to spread without a user helping them.
Adware Software that automatically downloads and installs on a computer system, which then advertises or directs the user to advertising material.
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

CCNA Security Final Exam
Maikel Degrande
Security Guard Training
Summit College
ISACA CISM Exam Glossary
Fred Jones
Security
annelieserainey
Securities Regulation
harpratap_singh
2W151 Volume 1: Safety and Security - Quiz 7
Joseph Whilden J
Security Quiz Review
Rylan Blah
Security Policies
indysingh7285
2W151 Volume 1: Safety and Security - Quiz 6
Joseph Whilden J
Security (2)
Daniel Freedman
Certified Security Compliance Specialist
jnkdmls