Unit 6.1 Data Security

studied byStudied by 0 people
0.0(0)
Get a hint
Hint

Security

1 / 20

encourage image

There's no tags or description

Looks like no one added any tags here yet for you.

21 Terms

1

Security

Measures taken to protect computer system etc. from unauthorised access/breaches.

New cards
2

Privacy

Rights and regulations around collection, use, dissemination of personal/sensitive info.

New cards
3

Integrity

Accuracy, consistency & reliability of data.

New cards
4

Cyber Threats

Various types of malware such as viruses, worms, spyware, Trojan horses, and ransomware that can harm computer systems and files.

New cards
5

Malware

Software containing malicious code that can damage computer systems and files, spread through email attachments, phishing, untrustworthy websites, or memory sticks.

New cards
6

Virus

Malware that corrupts/deletes/disrupts computer, unable to spread by itself, needs user action.

New cards
7

Computer Worm

Malware that acts similar to virus but can spread on its own.

New cards
8

Spyware

Malware that gathers info about users activities e.g. keystrokes

New cards
9

Trojan Horse

Malware that looks like genuine software but release malicious code when opened.

New cards
10

Ransomware

Malware that encrypts users computer and requests ransom payment for user to retrieve data.

New cards
11

White-Hat Hacker

Ethical hacker who identifies vulnerabilities in systems and reports them to improve security.

New cards
12

Grey-Hat Hacker

In between White & Black-Hat, may choose to hack without malicious intent and report vulnerabilities to org.

New cards
13

Black-Hat Hacker

Hacker that exploits vulnerabilities and doesn’t have permission or follow regulations

New cards
14

Phishing

Illegally obtaining sensitive information by tricking individuals into revealing it, often through emails or phone calls impersonating legitimate entities.

New cards
15

Pharming

Malware that directs user from genuine to fake website without their knowledge/consent.

New cards
16

Firewall

Software that checks all incoming traffic against rule before it reaches computer, if it doesn’t match it blocks access

New cards
17

Signature Detection

Anti-Virus that scans everything and checks it against a known virus database

New cards
18

Heuristic Analysis

Anti-Virus that analyses file behaviour to see if its an unknown virus

New cards
19

Encryption

Encoding data to prevent unauthorized access, with symmetric encryption using one key and asymmetric encryption using two keys for secure data transmission and storage.

New cards
20

Authentication

Confirming the identity of a person through factors like something they know (password), something they have (ID card), or something they are (biometrics like fingerprint or facial recognition).

New cards
21

Access Rights

Permissions that allow different users/groups to access or be denied specific parts of a network, including read, write, delete, and create actions.

New cards

Explore top notes

note Note
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 151 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 17 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 298 people
Updated ... ago
5.0 Stars(9)
note Note
studied byStudied by 347 people
Updated ... ago
5.0 Stars(5)
note Note
studied byStudied by 6 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 79 people
Updated ... ago
5.0 Stars(3)

Explore top flashcards

flashcards Flashcard50 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard57 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard34 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard204 terms
studied byStudied by 7 people
Updated ... ago
4.0 Stars(1)
flashcards Flashcard799 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard46 terms
studied byStudied by 79 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 46 people
Updated ... ago
5.0 Stars(2)