Chapter 6 Flashcards
Data privacy
the privacy of personal information, or
other information stored on a computer, that should not
be accessed by unauthorised parties.
Data protection laws
laws which govern how data
should be kept private and secure.
Data security
methods taken to prevent unauthorised
access to data and to recover data if lost or corrupted.
Malware
malicious software that seeks to damage or
gain unauthorised access to a computer system.
Firewall
software or hardware that sits between
a computer and external network that monitors and
filters all incoming and outgoing activities.
Anti-spyware software
software that detects and
removes spyware programs installed illegally on a
user’s computer system.
Encryption
the use of encryption keys to make data
meaningless without the correct decryption key
Biometrics
use of unique human characteristics to
identify a user (such as fingerprints or face recognition).
Hacking
illegal access to a computer system without
the owner’s permission.
Malicious hacking
hacking done with the sole intent
of causing harm to a computer system or user
User account
an agreement that allows an individual
to use a computer or network server, often requiring a
user name and password.
Authentication
a way of proving somebody or
something is who or what they claim to be.
Access rights (data security)
use of access levels to ensure
only authorised users can gain access to certain data.
Ethical hacking
hacking used to test the security
and vulnerability of a computer system. The hacking is
carried out with the permission of the computer system
owner, for example, to help a company identify risks
associated with malicious hacking of their computer
systems.
Phishing
legitimate-looking emails designed to trick
a recipient into giving their personal data to the sender
of the email.