1/17
Vocabulary flashcards for reviewing computer security concepts.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Computer Security
Protection of computer systems and data, covering both physical and digital security, guarding against unauthorized access, protecting hardware, software, and data, and ensuring services run smoothly.
Physical Security
Protecting actual computers and equipment.
Cybersecurity
Protecting digital information.
IT Security
Combination of both physical and cyber protection.
Data Centers
Buildings where important computer systems are stored.
Threat
A potential danger that can harm computer systems or data, either accidentally or intentionally (e.g., natural disasters, human errors, malicious attacks).
Vulnerability
Weaknesses in a system that can exist at the network, host, or application level, and can be found in software design, security practices, or user behavior.
Attack
Actions that exploit vulnerabilities to carry out threats, ranging from simple password guessing to complex malware or social engineering tricks.
Countermeasures
Security steps to protect systems by fixing vulnerabilities and preventing attacks, including better software design, strong passwords, and security updates.
Hacking
Unauthorized system access that uses security weaknesses, often targeting websites to steal private information, and may involve special hacking tools.
Data Misuse
Includes copying data without permission, stealing personal information, taking company secrets, sharing private files, and using others' work without credit.
Copyright Violation
Illegal copying of software, music, movies, or books, and sharing copyrighted files online, breaking copyright laws.
Email Abuse
Includes email spam, spreading rumors, and harassment.
Identity Theft
Involves credit card fraud, fake online stores, money scams, and counterfeit money printing.
Computer Virus
Harmful programs that spread between computers, destroying files, stealing information, and slowing down systems.
The Computer Misuse Act
Makes hacking illegal, protects against data theft, stops unauthorized changes.
Data Protection
Laws that protect personal information, limit how data can be used, give rights to individuals, require secure storage, and prevent misuse.
Copyright Protection
Protects creative works, covers digital content, stops illegal sharing, and applies to writing, music, movies, and software.