1.3- Computer Management Flashcards
Biometric security
Security based on measurement and ID of unique physical characteristics of person, eg fingerprints
Data validation
Checking for the correctness of data from a computer perspective, ie with reference to a defined set of criteria or allowable values, which the computer program will either accept or reject
Data verification
Checking for accuracy of data from human perspective
Defensive programming
A technique whereby programmer makes pro-active provision for possible errors made by user, in interest of correct data entry
Disk imaging
Creating a backup ‘image’ of entire hard drive, including all data and programs, to be used for re-installation in case of complete hard drive failure
Encryption
The ‘scrambling’ of text or data according to a specified set of rules to ensure privacy of data during communication, or for security purposes
Firewall
Hardware or software that monitors traffic between computer and Internet, to safeguard against breaches in security
GIGO
‘Garbage In, Garbage Out’: quality of output for any computer system is directly related to quality of input
Incremental backup
Backup schedule whereby backups are made only of new files and files that have been changed since the last backup, resulting in greater backup efficiency (saving disk space and time), and allowing selective data recovery from an earlier date
Malware
Malicious Software: general term used to describe malicious software specifically designed to install itself without user’s knowledge to negatively affect or ‘harm’ a computer system
Online backup
The backing up of data on a server on the Internet (‘the cloud’), with the advantages of data synchronisation, sharing and portability
Phishing
Attempts from people, generally employing e-mail, to direct other people to fake websites, where they are tricked into releasing personal information (eg passwords); then using these details to commit identity theft and fraud
RAID
Redundant Array of Independent Disks: the configuration of 2 or more hard drives, designed to minimise possibility of data loss
Rootkit
Collection of programs designed to use admin rights to gain control of computer for dangerous purposes
Social engineering
Any attempt to manipulate or ‘con’ someone into installing malware or giving out sensitive or personal information