Data Security Flashcards
Antivirus Software
A program that can be loaded into memory when the computer is running. It monitors the activity on a computer for the signs of a virus.
Firewalls
Software or hardware that controls the incoming and outgoing network traffic. Data is analysed to decide if it should be allowed through or not
Access Levels
A method used to allow only certain users read and/or write access to data on a computer system.
Passwords
Used to prove a persons identity to computer system, thus allowing them access to relevant data.
Double authentication
Users provide 2 forms of ID. Usually something they know (pin) and something the have (bank card).
Network Forensics
This involves monitoring the traffic on a network. At regular intervals transmitted data packets are copied. The copy information about the packet are then stored for later analysis. This is usually processes in batches. The information gathered can help identify invasive traffic or to determine where data is being sent.
Ethical hacking
Carried out with the permission of the system owner to cover all computer attack techniques.
An ethical hacker attempts to bypass system security and search for any weak points that could be exploited by malicious hackers. This information is then used by the system owner to improve system security.
Penetration testing
A sub-set of ethical hacking that deals with the process of testing a network/system to find vulnerabilities that an attacker could exploit.
Targeted
Carried out by the organisation’s IT team and the penetration testing team working together.
External
to find out if an outside attacker can get in and how far they can get in once they have gained access.
Internal
to estimate how much damage a dissatisfied employee could cause
Blind
to simulate the actions of a real attacker by severely limiting the information given to the team performing the test.
Foot printing
The first step in the evaluation of system security. It involves gathering all available information about the computer system or network. Used to limit technical information about a system that is publicly available.
Networking standards
Ensures how different hardware and software produced can work together. Without networking standards, it would be difficult to develop networks that easily share information.
Viruses
A program that is able to copy itself onto other programs with the intention of damaging data. A virus is transmitted by ‘piggybacking’ on another program known as a ‘vector’.