Home
Explore
Exams
Search for anything
Login
Get started
Home
Security review
Security review
0.0
(0)
Rate it
Studied by 0 people
View linked note
Knowt Play
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/16
There's no tags or description
Looks like no tags are added yet.
Study Analytics
All Modes
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
17 Terms
View all (17)
Star these 17
1
New cards
Data Validation
Checks that the data entered is reasonable.
2
New cards
An example of data validation
Range checking, which ensures that the data falls within a specified range.
3
New cards
Data Verification
Checks that the data entered is the same as the original.
4
New cards
An example of data verification
Double entry, where the data is entered twice and checked for consistency.
5
New cards
Firewall
A security measure that controls incoming and outgoing network traffic based on security rules.
6
New cards
Additional Security Measure
Antivirus software, which detects and removes malicious software.
7
New cards
Source Code Encryption
It converts the source code into a secure format that is unreadable without a decryption key.
8
New cards
Data Backup
Creates a copy of data to restore it after a loss.
9
New cards
Disk Mirroring
Creates an exact copy of the data on a secondary drive, providing real-time data redundancy.
10
New cards
Difference between Security and Privacy
Security refers to protecting data against unauthorized access, while privacy concerns the proper use of consumer data.
11
New cards
Non-physical Security Method 1
Firewalls that monitor and control incoming and outgoing network traffic.
12
New cards
Non-physical Security Method 2
Encryption which secures data making it unreadable to unauthorized users.
13
New cards
Parity Block Check
It identifies corrupted bits by adding a parity bit that indicates whether the number of set bits is even or odd.
14
New cards
Situation where Parity Block Check fails
When two bits are corrupted, the parity may remain the same, leading to no error being detected.
15
New cards
Security Method 1
Regularly updating software to patch vulnerabilities.
16
New cards
Security Method 2
Using strong passwords and changing them regularly.
17
New cards
Integrity Method
Hashing, which ensures that data has not been altered by producing a unique hash value.
Explore top notes
Middle Childhood: Emotional Development
Updated 930d ago
Note
Preview
Developmental Psychology
Updated 471d ago
Note
Preview
Chapter 3: Demand, Supply, and Market Equilibrium
Updated 1054d ago
Note
Preview
Cytoskeleton
Updated 1104d ago
Note
Preview
Muscular System
Updated 985d ago
Note
Preview
Week 7- Notes
Updated 219d ago
Note
Preview
AP MODERN HUMAN GEO UNIT 2
Updated 556d ago
Note
Preview
Philosophy of Science (IB)
Updated 387d ago
Note
Preview
Explore top flashcards
Media Studies Terminology
Updated 468d ago
Flashcards (45)
Preview
Modern Liberalism
Updated 488d ago
Flashcards (68)
Preview
On the Go 3 - Irregular Verbs #1
Updated 729d ago
Flashcards (30)
Preview
Unit 8: Topic 5, 6, and 7 - Community Ecology, Biodiversity, and Disruptions
Updated 839d ago
Flashcards (28)
Preview
German 102-3 Quiz 3 Vocab
Updated 838d ago
Flashcards (27)
Preview
Term 3 Vocab
Updated 31d ago
Flashcards (190)
Preview
Vocab #6 (The Alchemist)
Updated 675d ago
Flashcards (20)
Preview
MQF (v1.2)
Updated 305d ago
Flashcards (119)
Preview