Data Security & Issues In Technology Flashcards

1
Q

Authentication

A

Authentication is a process of verifying the identity of a user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authorisation

A

Authorisation is the ability of a computer to control user’s access to data and resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Privacy

A

Privacy is the ability to keep specific data or resources from being known to others

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Cookies

A

A small file used by websites to store personal information on a user’s web browser. It is needed to keep track of authentication information users currently logged in, users moments and preferences within the website

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Pharming

A

Interception of requests sent from a computer to a legitamite website and redirection to a fake website to steal personal information or credit card details.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

The use of emails and fake websites that appear to be from reputable companies in order to steal personal information such as passwords and credit card numbers from users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spamming

A

Mass distribution of unwanted messages or emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spyware

A

A hidden program that secretly collects personal information about its users and transmits this information to attackers without the user’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Trojan Horse

A

A computer program that pretends to be a harmless file or useful application and gives unauthorised access to the intruder.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Virus

A

A computer program that attaches itself to a normally harmless program and modifies it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Worm

A

A computer program that runs automatically and attempts to spread by sending copies of itself to other computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Unauthorised Access (Hacking)

A

Use of data by someone else without permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Passwords

A

A secret word or phrase known to the user only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

OTP

A

A password generated which is only valid for a short period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

OTP

A

A password that is generated which is only valid for a short period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Security Token

A

A device that is used specifically for authentication purposes

17
Q

Biometrics

A

Authentication based on the measurement of unique human physical characteristics

18
Q

File Permissions

A

Settings from operating system to control the ability of users to view or make changes to specific files or folders

19
Q

Firewalls

A

Device or computer that prevents unauthorised access to or from a private network

20
Q

Encryption

A

Process or encoding data so that a secret key is needed to decode the data

21
Q

Parity check

A

An additional bit, known as the parity bit is appended or prepended to a string of binary data for transmission. In the odd parity system, the total number of 1 bits in each packet should be odd. In the even parity system, the total number of 1 bits in each packet should be even. Else, the data is corrupted.

22
Q

Checksum

A

Calculated value used to determine integrity of transmitted data. It serves as a unique identifier for data and is sent together with the data. The data and checksum are being sent together. At the destination, the checksum is recalculated and compared to get the original checksum value. Error has occurred if the two checksums are different.

23
Q

Local Area Network (LAN)

A

A network of computing devices within a small geographical area, typically within the same building. A small number of connections supported and close proximity of the devices. Typically provides faster data transfer than other networks.

24
Q

Metropolitan Area Network (MAN)

A

A network of computing devices covering two or more buildings within the same town or city. Typically owned and operated by a large organisation such as a business or government body.

25
Q

Wide Area Network (WAN)

A

A network of computing devices covering across large-scale geographical locations. Generally consists of multiple smaller networks such as LANs or MANs.

26
Q

Wired network

A

Network of devices connected by a physical medium such as cables

27
Q

Wireless Network

A

Network of devices in which signals are transmitted in the form of electromagnetic waves such as radio waves and microwaves

28
Q

Client

A

A client is a network device that initiates a connection to a server to request for resources and services to perform operations

29
Q

Server

A

A server is a network device that shared resources and responds to requests from devices and other servers on the network