1/36
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Non functional requirement
A characteristic of what the user would want like custom fonts etc.
Functional requirement
A function in the code that is necessary for it to run
Scope
The boundaries of the solution/ what it will do and what it won’t
Constraints
What the solution will not be able to do
Data collection methods:
Interviews, surveys
Malware
Trojan, spyware, virus, worms
Ciphers
Protects data by using something called encryption turning readable data into an unreadable format.
Polyalphabetic cipher
used to substitute alphabets
Vigener cipher
shifts positions in the alphabet
Machine learning
Ai analyses various data traffic identifying patterns allowing to authenticate malicious activities.
Ethical hacking/ white hat hacking
Professionals who purposely try to hack a system trying to figure out possible vulnerabilities
LAN
local area network connects device in a limited geographical location
WAN
wide area network is in more than 1 geographical location often consisted of 2 lans able to communicate using the internet.
Router
a device used to connect multiple lans or a wan allowing them connect to the internet.
switch
A device that uses physical device signals to send it to the right place. It chooses where to send it opposite to a hub.
Hub
A device that takes signals then distributes it to the entire network.
Federal parliment
responsible for creating legistrations that applies to all individuals and organisations in Australia.
State parliment
responsible for creating legistrations for individuals in a specific state.
Act of parliment
document that contains a set of rules for a particular area
HPP2
Only disclose health information for the primary purpose it was collected for or directly related to the secondary purpose.
HPP4
Safeguard the information you hold against misuse
HPP5
Documents should clearly express polices in your management of health. Make this available for anyone who asks.
APP1
Open and transparent management of personal information. Clear privacy policy
APP6
use or disclose personal information for the primary purpose
APP11
Take reasonable steps to protect the data from threats.
IPP2
Personal information should only be disclosed for the primary purpose
IPP4
Organisations should protect personal information from misuse.
IPP5
Organisations must have clearly expressed polices
Sequence
A set of instructions that executes line by line
Selection
Allows applications to make decisions
Iteration
also known as a loop is used to repeat code multiple times.
Software maintenance
making change to the software after they have been installed to improve performance.
operating system updates
keeping the software updated to improve usability functionaility and security
Staff procedures
Steps staff should take when dealing with data and information.
encription
involves changing data so it can only be decrypted with a key.
symmetric encryption
both sender and user use the same private key.
asymmetric encryption
The sender uses a public key to encrypt the message where as the receiver uses a private key to decrypt the information.