1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Malware
Software specifically designed to disrupt, damage, or gain unauthorised access to a system.
Phishing
Scam or fraudulent attempts to deceive people into disclosing sensitive information or to install malware.
DoS Attack
Denial of service - blocking access to data or systems, often with a ransom.
Trojan Horse
Malware that disguises as a legitimate software or app to trick users into installing it.
Virus
Malware designed to spread from one computer to another.
Brute Force Attack
Systematic guessing of user credentials to gain access.
3-2-1 Backup Rule
3 copies, 2 storage types, 1 off-site backup
Factors of authentication (What are the 3 types?)
Something you know, something you have, something you are.
Data
The raw facts in a database (e.g. text, numbers, images, graphs).
Information
Data becomes information when processed to provide meaning to the user.
Database
A collection of related records stored and organised such that the user can obtain information.
Flat-file database
Also known as a spreadsheet, contains only one table of information.
Data redundancy
The unnecessary repetition of data in a database.
Data inconsistency
Redundant fields with incorrect spelling or an inconsistency in entries of similar items of data.
Entity Relationship Diagram (ERD)
Graphical representation of relationships between entities.
Cardinality
The relationship between 2 tables.
Data Normalisation
The rules for making data "normal" - removing errors, repeated fields, etc. to make it database-ready.
Composite Key
When two foreign keys are combined to form a primary key.
Relational Database
A database with multiple tables that are connected through relationships.
Flat-File Database Characteristics
Cheap to use, simple setup, redundancy, hard to update
Relational Database Characteristics
Efficient, SQL support, more complex setup & maintenance, DBMS required.