Chapter 6 Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

Data privacy

A

the privacy of personal information, or
other information stored on a computer, that should not
be accessed by unauthorised parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Data protection laws

A

laws which govern how data

should be kept private and secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Data security

A

methods taken to prevent unauthorised

access to data and to recover data if lost or corrupted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Malware

A

malicious software that seeks to damage or

gain unauthorised access to a computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Firewall

A

software or hardware that sits between
a computer and external network that monitors and
filters all incoming and outgoing activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-spyware software

A

software that detects and
removes spyware programs installed illegally on a
user’s computer system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

the use of encryption keys to make data

meaningless without the correct decryption key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Biometrics

A

use of unique human characteristics to

identify a user (such as fingerprints or face recognition).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hacking

A

illegal access to a computer system without

the owner’s permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malicious hacking

A

hacking done with the sole intent

of causing harm to a computer system or user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User account

A

an agreement that allows an individual
to use a computer or network server, often requiring a
user name and password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Authentication

A

a way of proving somebody or

something is who or what they claim to be.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Access rights (data security)

A

use of access levels to ensure

only authorised users can gain access to certain data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ethical hacking

A

hacking used to test the security
and vulnerability of a computer system. The hacking is
carried out with the permission of the computer system
owner, for example, to help a company identify risks
associated with malicious hacking of their computer
systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

legitimate-looking emails designed to trick
a recipient into giving their personal data to the sender
of the email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Pharming

A

redirecting a user to a fake website in order

to illegally obtain personal data about the user.

17
Q

DNS cache poisoning

A

altering IP addresses on a DNS
server by a ‘pharmer’ or hacker with the intention of
redirecting a user to their fake website.

18
Q

Data integrity

A

the
accuracy, completeness
and consistency of data.

19
Q

Validation

A
method
used to ensure entered
data is reasonable and
meets certain input
criteria.
20
Q

Verification

A

method
used to ensure data is
correct by using double
entry or visual checks.

21
Q

Check digit

A
additional
digit appended to a
number to check if
entered data is
error free.
22
Q

Modulo-11

A

method
used to calculate a
check digit based on
modulus division by 11.

23
Q

Checksum

A
verification method
used to check if data
transferred has been
altered or corrupted,
calculated from the
block of data to be sent.
24
Q

Parity check

A
method
used to check if data
has been transferred
correctly that uses
even or odd parity.
25
Q

Parity bit

A
an extra
bit found at the end
of a byte that is set to
1 if the parity of the
byte needs to change
to agree with sender/
receiver parity protocol.
26
Q

Odd parity

A

binary
number with an odd
number of 1-bits.

27
Q

Even parity

A

binary
number with an even
number of 1-bits.

28
Q

Parity block

A

horizontal
and vertical parity check
on a block of data being
transferred.

29
Q

Parity byte

A
additional
byte sent with
transmitted data to
enable vertical parity
checking (as well
as horizontal parity
checking) to be carried
out.
30
Q

Automatic repeat

request (ARQ)

A

a type

of verification check.

31
Q

Acknowledgment

A

message sent to a
receiver to indicate that
data has been received
without error.

32
Q

Timeout

A

time allowed
to elapse before an
acknowledgment is
received.