Computer Security and Cybersecurity

0.0(0)
studied byStudied by 1 person
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/17

flashcard set

Earn XP

Description and Tags

Vocabulary flashcards for reviewing computer security concepts.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

18 Terms

1
New cards

Computer Security

Protection of computer systems and data, covering both physical and digital security, guarding against unauthorized access, protecting hardware, software, and data, and ensuring services run smoothly.

2
New cards

Physical Security

Protecting actual computers and equipment.

3
New cards

Cybersecurity

Protecting digital information.

4
New cards

IT Security

Combination of both physical and cyber protection.

5
New cards

Data Centers

Buildings where important computer systems are stored.

6
New cards

Threat

A potential danger that can harm computer systems or data, either accidentally or intentionally (e.g., natural disasters, human errors, malicious attacks).

7
New cards

Vulnerability

Weaknesses in a system that can exist at the network, host, or application level, and can be found in software design, security practices, or user behavior.

8
New cards

Attack

Actions that exploit vulnerabilities to carry out threats, ranging from simple password guessing to complex malware or social engineering tricks.

9
New cards

Countermeasures

Security steps to protect systems by fixing vulnerabilities and preventing attacks, including better software design, strong passwords, and security updates.

10
New cards

Hacking

Unauthorized system access that uses security weaknesses, often targeting websites to steal private information, and may involve special hacking tools.

11
New cards

Data Misuse

Includes copying data without permission, stealing personal information, taking company secrets, sharing private files, and using others' work without credit.

12
New cards

Copyright Violation

Illegal copying of software, music, movies, or books, and sharing copyrighted files online, breaking copyright laws.

13
New cards

Email Abuse

Includes email spam, spreading rumors, and harassment.

14
New cards

Identity Theft

Involves credit card fraud, fake online stores, money scams, and counterfeit money printing.

15
New cards

Computer Virus

Harmful programs that spread between computers, destroying files, stealing information, and slowing down systems.

16
New cards

The Computer Misuse Act

Makes hacking illegal, protects against data theft, stops unauthorized changes.

17
New cards

Data Protection

Laws that protect personal information, limit how data can be used, give rights to individuals, require secure storage, and prevent misuse.

18
New cards

Copyright Protection

Protects creative works, covers digital content, stops illegal sharing, and applies to writing, music, movies, and software.