Home
Explore
Exams
Search for anything
Login
Get started
Home
Security review
Security review
0.0
(0)
Rate it
Studied by 0 people
View linked note
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/16
There's no tags or description
Looks like no tags are added yet.
Study Analytics
All
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
17 Terms
View all (17)
Star these 17
1
New cards
Data Validation
Checks that the data entered is reasonable.
2
New cards
An example of data validation
Range checking, which ensures that the data falls within a specified range.
3
New cards
Data Verification
Checks that the data entered is the same as the original.
4
New cards
An example of data verification
Double entry, where the data is entered twice and checked for consistency.
5
New cards
Firewall
A security measure that controls incoming and outgoing network traffic based on security rules.
6
New cards
Additional Security Measure
Antivirus software, which detects and removes malicious software.
7
New cards
Source Code Encryption
It converts the source code into a secure format that is unreadable without a decryption key.
8
New cards
Data Backup
Creates a copy of data to restore it after a loss.
9
New cards
Disk Mirroring
Creates an exact copy of the data on a secondary drive, providing real-time data redundancy.
10
New cards
Difference between Security and Privacy
Security refers to protecting data against unauthorized access, while privacy concerns the proper use of consumer data.
11
New cards
Non-physical Security Method 1
Firewalls that monitor and control incoming and outgoing network traffic.
12
New cards
Non-physical Security Method 2
Encryption which secures data making it unreadable to unauthorized users.
13
New cards
Parity Block Check
It identifies corrupted bits by adding a parity bit that indicates whether the number of set bits is even or odd.
14
New cards
Situation where Parity Block Check fails
When two bits are corrupted, the parity may remain the same, leading to no error being detected.
15
New cards
Security Method 1
Regularly updating software to patch vulnerabilities.
16
New cards
Security Method 2
Using strong passwords and changing them regularly.
17
New cards
Integrity Method
Hashing, which ensures that data has not been altered by producing a unique hash value.
Explore top notes
What is the number limit for Robinhood {💚 Live~Chat 💜}
Updated 121d ago
Note
Preview
The Shapes of Molecules: VSEPR Theory
Updated 1012d ago
Note
Preview
CPCT/A Exam Test Plan Notes
Updated 6d ago
Note
Preview
Earth’s Near Neighbors: Mercury, Venus, and Mars
Updated 859d ago
Note
Preview
Killing Mr Griffin
Updated 706d ago
Note
Preview
Artistic Vanguards
Updated 1289d ago
Note
Preview
Chapter 8 - Regulation and Anti-trust Laws
Updated 814d ago
Note
Preview
Stages of Human Development to Know for AP Psychology (2025) (AP)
Updated 158d ago
Note
Preview
Explore top flashcards
Maladaptive & Adaptive Defense Mechanisms
Updated 608d ago
Flashcards (51)
Preview
1-1~2 . 역사의 의미와 역사 학습의 목적~세계의 선사 문화와 고대 문명
Updated 443d ago
Flashcards (155)
Preview
Lit terms (ongoing)
Updated 482d ago
Flashcards (45)
Preview
The Digestion System and Body Metabolism
Updated 428d ago
Flashcards (164)
Preview
World War One
Updated 591d ago
Flashcards (69)
Preview
Rhetorical Terms
Updated 32d ago
Flashcards (80)
Preview
social psychology- exam 1
Updated 433d ago
Flashcards (149)
Preview
Psych: Development
Updated 93d ago
Flashcards (97)
Preview