Chapter 6 Flashcards

1
Q

Data privacy

A

the privacy of personal information, or
other information stored on a computer, that should not
be accessed by unauthorised parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data protection laws

A

laws which govern how data

should be kept private and secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data security

A

methods taken to prevent unauthorised

access to data and to recover data if lost or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware

A

malicious software that seeks to damage or

gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall

A

software or hardware that sits between
a computer and external network that monitors and
filters all incoming and outgoing activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-spyware software

A

software that detects and
removes spyware programs installed illegally on a
user’s computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

the use of encryption keys to make data

meaningless without the correct decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometrics

A

use of unique human characteristics to

identify a user (such as fingerprints or face recognition).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacking

A

illegal access to a computer system without

the owner’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious hacking

A

hacking done with the sole intent

of causing harm to a computer system or user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User account

A

an agreement that allows an individual
to use a computer or network server, often requiring a
user name and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

a way of proving somebody or

something is who or what they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access rights (data security)

A

use of access levels to ensure

only authorised users can gain access to certain data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ethical hacking

A

hacking used to test the security
and vulnerability of a computer system. The hacking is
carried out with the permission of the computer system
owner, for example, to help a company identify risks
associated with malicious hacking of their computer
systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

legitimate-looking emails designed to trick
a recipient into giving their personal data to the sender
of the email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pharming

A

redirecting a user to a fake website in order

to illegally obtain personal data about the user.

17
Q

DNS cache poisoning

A

altering IP addresses on a DNS
server by a ‘pharmer’ or hacker with the intention of
redirecting a user to their fake website.

18
Q

Data integrity

A

the
accuracy, completeness
and consistency of data.

19
Q

Validation

A
method
used to ensure entered
data is reasonable and
meets certain input
criteria.
20
Q

Verification

A

method
used to ensure data is
correct by using double
entry or visual checks.

21
Q

Check digit

A
additional
digit appended to a
number to check if
entered data is
error free.
22
Q

Modulo-11

A

method
used to calculate a
check digit based on
modulus division by 11.

23
Q

Checksum

A
verification method
used to check if data
transferred has been
altered or corrupted,
calculated from the
block of data to be sent.
24
Q

Parity check

A
method
used to check if data
has been transferred
correctly that uses
even or odd parity.
25
Parity bit
``` an extra bit found at the end of a byte that is set to 1 if the parity of the byte needs to change to agree with sender/ receiver parity protocol. ```
26
Odd parity
binary number with an odd number of 1-bits.
27
Even parity
binary number with an even number of 1-bits.
28
Parity block
horizontal and vertical parity check on a block of data being transferred.
29
Parity byte
``` additional byte sent with transmitted data to enable vertical parity checking (as well as horizontal parity checking) to be carried out. ```
30
Automatic repeat | request (ARQ)
a type | of verification check.
31
Acknowledgment
message sent to a receiver to indicate that data has been received without error.
32
Timeout
time allowed to elapse before an acknowledgment is received.