Security review

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/16

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

17 Terms

1
New cards
Data Validation
Checks that the data entered is reasonable.
2
New cards
An example of data validation
Range checking, which ensures that the data falls within a specified range.
3
New cards
Data Verification
Checks that the data entered is the same as the original.
4
New cards
An example of data verification
Double entry, where the data is entered twice and checked for consistency.
5
New cards
Firewall
A security measure that controls incoming and outgoing network traffic based on security rules.
6
New cards
Additional Security Measure
Antivirus software, which detects and removes malicious software.
7
New cards
Source Code Encryption
It converts the source code into a secure format that is unreadable without a decryption key.
8
New cards
Data Backup
Creates a copy of data to restore it after a loss.
9
New cards
Disk Mirroring
Creates an exact copy of the data on a secondary drive, providing real-time data redundancy.
10
New cards
Difference between Security and Privacy
Security refers to protecting data against unauthorized access, while privacy concerns the proper use of consumer data.
11
New cards
Non-physical Security Method 1
Firewalls that monitor and control incoming and outgoing network traffic.
12
New cards
Non-physical Security Method 2
Encryption which secures data making it unreadable to unauthorized users.
13
New cards
Parity Block Check
It identifies corrupted bits by adding a parity bit that indicates whether the number of set bits is even or odd.
14
New cards
Situation where Parity Block Check fails
When two bits are corrupted, the parity may remain the same, leading to no error being detected.
15
New cards
Security Method 1
Regularly updating software to patch vulnerabilities.
16
New cards
Security Method 2
Using strong passwords and changing them regularly.
17
New cards
Integrity Method
Hashing, which ensures that data has not been altered by producing a unique hash value.