1/10
Flashcards for Computer Crime, Cybersecurity, and Technologies.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Phishing Scams
Scams that trick users into giving away personal information via email.
Computer Misuse Act 1990
Covers hacking, fraud, and unauthorized data modification.
Antivirus
Software used to protect systems from malware.
Firewalls
Security systems that control network traffic to protect against unauthorized access.
Encryption
The process of encoding data to prevent unauthorized access.
Copyright
Protection of original works (text, images, software, etc.).
Ergonomic Setups
Workstation configurations designed to reduce strain and injury.
Sensors
Devices that detect environmental changes (light, motion, temp, etc.).
Robots
Machines that carry out tasks automatically.
Automated Systems
Systems that run with minimal human input (e.g., ATMs, traffic lights).
Artificial Intelligence (AI)
Machines simulating human intelligence.