ch6 Flashcards
data privacy
privacy of personal information that cannot be seen or accessed by an unauthorised party
data security
a method taken to prevent unauthorised access of data or to recover data that is lost or corrupted
firewall
software or hardware that sits between a computer and an external network that monitors all incoming and outgoing activities
tasks carried out by a firewall
1- examining the traffic between a computer and an external network
2- checks if incoming or outgoing data meets a certain criteria
3- prevents access to certain unwanted sites
4-helps preventing viruses and hackers from entering the computer
encryption
the use of encryption keys to make data meaningless without the correct decryption key
phishing
legitimate-looking email that tricks the user into giving their personal data to the sender of the email
pharming
redirecting the user to a fake website in order to illegally obtain personal data
data integrity
the accuracy, completeness and consistency of data
authentication techniques
1- digital signature
2- firewall
3-anti-virus software
4- anti-spyware software
5- encryption
how digital signature is used to authenticate a digital document during transmission over a network
the sender hashes the document to produce a digest the sender encrypts the digest, the receiver decrypts the digest If both of the receiver’s digests are the same the document is authentic
Antivirus
scans the computer for viruses and checks against
a stored database of viruses, that needs to be
updated regularly and then deletes / quarantines
them
- compares downloaded files to a database of known
viruses and prevents the download continuing
Antispyware
scans the computer for spyware and checks
against a stored database of viruses, that needs to
be updated regularly and then deletes / quarantines
them
- compares downloaded files to a database of known
spyware and prevents the download continuing
Antimalware
scans the computer for viruses and checks against
a stored database of viruses, that needs to be
updated regularly and then deletes / quarantines
them
- compares downloaded files to a database of known
viruses and prevents the download continuing
Explain how the CU, system clock and control bus operate to transfer data between the
components of the computer system
1-The system clock gives out timing signals
2- … which are sent on the control bus
3- …to synchronise the other system components
4- The Control Unit initiates data transfer
5-…by generating signals that are sent on the control bus to other
components
freeware
software that can be downloaded free of charge; however, it is covered by the usual copyright laws and cannot be modified; nor can the code be used for another purpose (no source code is available)