Chapter 6 Flashcards
Data privacy
the privacy of personal information, or
other information stored on a computer, that should not
be accessed by unauthorised parties.
Data protection laws
laws which govern how data
should be kept private and secure.
Data security
methods taken to prevent unauthorised
access to data and to recover data if lost or corrupted.
Malware
malicious software that seeks to damage or
gain unauthorised access to a computer system.
Firewall
software or hardware that sits between
a computer and external network that monitors and
filters all incoming and outgoing activities.
Anti-spyware software
software that detects and
removes spyware programs installed illegally on a
user’s computer system.
Encryption
the use of encryption keys to make data
meaningless without the correct decryption key
Biometrics
use of unique human characteristics to
identify a user (such as fingerprints or face recognition).
Hacking
illegal access to a computer system without
the owner’s permission.
Malicious hacking
hacking done with the sole intent
of causing harm to a computer system or user
User account
an agreement that allows an individual
to use a computer or network server, often requiring a
user name and password.
Authentication
a way of proving somebody or
something is who or what they claim to be.
Access rights (data security)
use of access levels to ensure
only authorised users can gain access to certain data.
Ethical hacking
hacking used to test the security
and vulnerability of a computer system. The hacking is
carried out with the permission of the computer system
owner, for example, to help a company identify risks
associated with malicious hacking of their computer
systems.
Phishing
legitimate-looking emails designed to trick
a recipient into giving their personal data to the sender
of the email.
Pharming
redirecting a user to a fake website in order
to illegally obtain personal data about the user.
DNS cache poisoning
altering IP addresses on a DNS
server by a ‘pharmer’ or hacker with the intention of
redirecting a user to their fake website.
Data integrity
the
accuracy, completeness
and consistency of data.
Validation
method used to ensure entered data is reasonable and meets certain input criteria.
Verification
method
used to ensure data is
correct by using double
entry or visual checks.
Check digit
additional digit appended to a number to check if entered data is error free.
Modulo-11
method
used to calculate a
check digit based on
modulus division by 11.
Checksum
verification method used to check if data transferred has been altered or corrupted, calculated from the block of data to be sent.
Parity check
method used to check if data has been transferred correctly that uses even or odd parity.