Key terms Flashcards

1
Q

Account lockout

A

A software security method performed by operating system software that locks any account when a user fails a login attempt more than a set number of times. E.g an account can be locked for several hours if the user fails the login three consecutive times in a set time frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anti-Malware

A

Software designed to prevent, detect and eradicate malicious software such as a virus or a worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Anomaly based

A

Software designed to detect computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Audit trail

A

a record of activities on a computer system/network e.g. a record of modifications to data or access to parts of a system/network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Biometric access

A

Access to a computer system/network using technologies that measure and analyse human body characteristics for authentication purposes such as DNA, fingerprints, retinas, voice patterns, facial patterns and hand measurements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Botnet

A

A network of computers infected with malicious software and controlled without the owner’s knowledge e.g. to send spam or hoax emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Confidentiality

A

Information stored on a computer system/network must be protected against unintended or unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cyber dependent

A

Illegal activities dependent on the use of computers and the Internet, such as hacking or the distribution of malware on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cyber enabled

A

Illegal activities that could be undertaken without the use of computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Cyber security

A

Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Denial of service

A

An attempt to disrupt a network/business/organisation by issuing more requests than a system is able to cope with, it can be performed with malicious intent or as a protest

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Encryption

A

A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Escalation of privileges

A

Exploiting a weakness or weaknesses in an operating system or software application, such as a bug, design flaw or configuration oversight and gaining elevated access to resources that are normally protected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Firewall

A

Software that is designed to protect a computer system/network from unauthorised access and intrusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hoax email

A

Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly