Unit 6.1 Data Security

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/20

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

21 Terms

1
New cards

Security

Measures taken to protect computer system etc. from unauthorised access/breaches.

2
New cards

Privacy

Rights and regulations around collection, use, dissemination of personal/sensitive info.

3
New cards

Integrity

Accuracy, consistency & reliability of data.

4
New cards

Cyber Threats

Various types of malware such as viruses, worms, spyware, Trojan horses, and ransomware that can harm computer systems and files.

5
New cards

Malware

Software containing malicious code that can damage computer systems and files, spread through email attachments, phishing, untrustworthy websites, or memory sticks.

6
New cards

Virus

Malware that corrupts/deletes/disrupts computer, unable to spread by itself, needs user action.

7
New cards

Computer Worm

Malware that acts similar to virus but can spread on its own.

8
New cards

Spyware

Malware that gathers info about users activities e.g. keystrokes

9
New cards

Trojan Horse

Malware that looks like genuine software but release malicious code when opened.

10
New cards

Ransomware

Malware that encrypts users computer and requests ransom payment for user to retrieve data.

11
New cards

White-Hat Hacker

Ethical hacker who identifies vulnerabilities in systems and reports them to improve security.

12
New cards

Grey-Hat Hacker

In between White & Black-Hat, may choose to hack without malicious intent and report vulnerabilities to org.

13
New cards

Black-Hat Hacker

Hacker that exploits vulnerabilities and doesn’t have permission or follow regulations

14
New cards

Phishing

Illegally obtaining sensitive information by tricking individuals into revealing it, often through emails or phone calls impersonating legitimate entities.

15
New cards

Pharming

Malware that directs user from genuine to fake website without their knowledge/consent.

16
New cards

Firewall

Software that checks all incoming traffic against rule before it reaches computer, if it doesn’t match it blocks access

17
New cards

Signature Detection

Anti-Virus that scans everything and checks it against a known virus database

18
New cards

Heuristic Analysis

Anti-Virus that analyses file behaviour to see if its an unknown virus

19
New cards

Encryption

Encoding data to prevent unauthorized access, with symmetric encryption using one key and asymmetric encryption using two keys for secure data transmission and storage.

20
New cards

Authentication

Confirming the identity of a person through factors like something they know (password), something they have (ID card), or something they are (biometrics like fingerprint or facial recognition).

21
New cards

Access Rights

Permissions that allow different users/groups to access or be denied specific parts of a network, including read, write, delete, and create actions.