6.1 Data security Flashcards
Data privacy
the privacy of a personal information, or other information stored on a computer, that should not be accessed by unauthorized parties
Data protection laws
laws which govern how data should be kept private and secure
Data security
methods taken to prevent unauthorised parties access to data and to recover data if lost or corrupted
User account
an agreement that allows an individual to use a computer or network server, often requiring a username and password
Authentication
a way of proving somebody or something is who or what they claim to be
Access rights (data security)
use of access levels to ensure only authorised users can gain access to certain data
Malware
malicious software that seeks to damage or gain unauthorised access to a computer system
Firewall
software or hardware that sits between a computer and external network that monitors and filters all incoming and outcoming activities
Anti-spyware software
software that detects and removes spyware programs installed illegally on a user’s computer system
Encryption
the use of encryption keys to make data meaningless without the correct decryption key
Biometrics
use of unique human characteristics to identify a user
Hacking
illegal access to a computer system without the owner’s permission
Malicious hacking
hacking done with the sole intent of causing harm to a computer system or user
Ethical hacking
hacking used to test the security and vulnerability of a computer system, usually carried out with the permission of the computer system owner
Phishing
legitimate-looking emails designed to trick a recipient into giving their personal data to the sender of the email