Gr 11 1.3 COMPUTER MANAGEMENT – SAFE- GUARDING OUR DATA Flashcards
Biometric security
Security based on measurement and identification of unique
physical characteristics of a person, e.g fingerprints.
Data validation
Checking for the correctness of data from a computer
perspective, i.e with reference to a defined set of criteria, or
allowable values, which the computer program will either
accept or reject.
Data verification
Checking for the accuracy of data from a human perspective.
Defensive programming
A technique whereby the programmer makes pro-active
provision for possible errors made by the user, in the
interest of correct data entry.
Disk imaging
Creating a backup ‘image’ of the entire hard drive, including
all data and programs, to be used for re-installation in the
case of complete hard drive failure.
Encryption
The ‘scrambling’ of text or data according to a specified set
of rules to ensure the privacy of data during communication,
or for security purposes.
Firewall
Hardware or software that monitors the traffic between a
computer and the internet, to safeguard against breaches in
security.
GIGO
‘Garbage In, Garbage Out’ the quality of the output for any
computer system is directly related to the quality of the
input.
Incremental backup
Backup schedule whereby backups are made only on new
files and files that have changed since the last backup,
resulting in greater backup efficient (saving in disk space and
backup time), and allowing selective data recovery from an
earlier date.
Malware
Malware (malicious software) is a general term used to
describe malicious software that is specifically designed to
install itself without the user’s knowledge to negatively
affect or ‘harm’ a computer system.
Online backup
The backing up of data on a server on the Internet (‘the
cloud’), with the advantages of data synchronisation, sharing
and portability.
Phishing
Attempts from people, generally employing e-mail, to direct
other people to fake websites, where they are tricked into
releasing personal information (e.g passwords); then using
these details to commit identify theft and fraud.
Raid
Redundant Array of Inexpensive/Independent Disks – the
configuration of two or more hard drives, designed to
minimise the possibility of data loss.
Rootkit
Collection of programs designed to use administrator rights
to gain and control of a computer for dangerous purposes.
Software bug
A logical programming error that can cause unexpected
program behaviour, incorrect output or invalid data
processing.