6 Security, Privacy And Data Integrity Flashcards
Data privacy
The privacy of personal information, or other information stored on a computer, that should not be accessed by unauthorised parties
Data protection laws
Laws which govern how data should be kept private and secure
Data security
Methods taken to prevent unauthorised access to recover data if lost or corrupted
User accounts
An agreement that allows an individual to use a computer to network server often needed a username or password
Authentication
A way proving somebody or something is who/what they claim to be
Access rights
Use of access levels to ensure only authorised users can gain to certain data
Malware
Malicious software to seeks to damage or gain unauthorised access to a computer system
Firewall
Soft wear or hardware that sits between a computer and external network that monitors and filters all incoming and outgoing activites
Anti-spyware software
Soft wear that detects and removes spyware programs installed illegally on a users computer system
Encryption
The use of encryption keys to make data meaningless without the correct decryption key
Biometrics
Use of unique human characteristics to identify a user
Hacking
Illegal access to a computer system without the owners permission
Malicious hacking
Hacking done with the sole intent of cuasing harm to a computer system or user e.g deleting files
Ethical hacking
Hacking used to test the security systems and vulnerabilities of a computer system, and is carried out with the permission of the owner.
Phishing
Legitimate looking emails designed to trick a recipient into giving their personal data to the sender of the email