Key terms Flashcards
Account lockout
A software security method performed by operating system software that locks any account when a user fails a login attempt more than a set number of times. E.g an account can be locked for several hours if the user fails the login three consecutive times in a set time frame
Anti-Malware
Software designed to prevent, detect and eradicate malicious software such as a virus or a worm
Anomaly based
Software designed to detect computer intrusions and misuse by monitoring system activity and classifying it as either normal or anomalous
Audit trail
a record of activities on a computer system/network e.g. a record of modifications to data or access to parts of a system/network
Biometric access
Access to a computer system/network using technologies that measure and analyse human body characteristics for authentication purposes such as DNA, fingerprints, retinas, voice patterns, facial patterns and hand measurements
Botnet
A network of computers infected with malicious software and controlled without the owner’s knowledge e.g. to send spam or hoax emails
Confidentiality
Information stored on a computer system/network must be protected against unintended or unauthorised access
Cyber dependent
Illegal activities dependent on the use of computers and the Internet, such as hacking or the distribution of malware on a network.
Cyber enabled
Illegal activities that could be undertaken without the use of computers.
Cyber security
Refers to technologies, processes and practices designed to protect computers, networks, software and data from attack, damage or unauthorised access and aims to protect data confidentiality, integrity and availability
Denial of service
An attempt to disrupt a network/business/organisation by issuing more requests than a system is able to cope with, it can be performed with malicious intent or as a protest
Encryption
A method that is used to attempt to ensure data security by use of encrypted (secret) code. In order to read the contents of an encrypted message or file, someone must have access to a secret key or password that will enable them to decrypt the message or file.
Escalation of privileges
Exploiting a weakness or weaknesses in an operating system or software application, such as a bug, design flaw or configuration oversight and gaining elevated access to resources that are normally protected.
Firewall
Software that is designed to protect a computer system/network from unauthorised access and intrusion.
Hoax email
Usually an email message warning recipients of a non-existent threat, usually forging quotes supposedly from authorities such as Microsoft and IBM.