Keywords 9 - Security Flashcards

1
Q

Computer security

A

The protection of computers from unauthorised access and the protection of data from loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Server

A

A computer that handles requests from other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Request

A

A communication that asks for data to be transferred

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Physical security

A

Security which physically prevents access to a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Authentication

A

Security which prevents access to a computer even if the user has physical access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Anti-virus software

A

Software which finds and removes viruses from a computer by scanning it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Encryption

A

A method of modifying data to make it difficult to understand if intercepted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Key

A

Information that describes how a message is encrypted or decrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SSL (Secure Socket Layer)

A

A protocol (set of rules) that allows secure communication between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TLS (Transport Layer Security)

A

A recent, more secure version of SSL (Secure Socket Layer), which allows secure communication between computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware

A

Software designed to disrupt or modify a computer system and its data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virus

A

Self-replicating software that causes data loss by deleting or corrupting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Worm

A

Self-replicating software that fills a computer’s memory, causing it to slow or stop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Trojan Horse

A

A program disguised as another program that works like a virus, deleting or corrupting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Spyware

A

Software to collect personal and sensitive data and transmit this to the spyware’s authors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Phishing

A

Asking for data using an email that looks like it comes from a trusted source

17
Q

Pharming

A

Using emails to trick a user into visiting a fake website and giving away personal or sensitive data

18
Q

DoS attack (Denial of Service)

A

Preventing access to a server through sending a large number of requests from one computer at the same time, overwhelming the server

19
Q

DDoS attack (Distributed Denial of Service)

A

Preventing access to a server through sending a large number of requests from many computers at the same time, overwhelming the server

20
Q

Biometrics

A

Use of physical characteristics as a means of identification on a computer (e.g. eye or fingerprint recognition)

21
Q

Firewall

A

A security technology (hardware or software) that monitoring incoming and outgoing traffic, blocking traffic as needed

22
Q

Proxy server

A

Prevents direct access to a server by directing traffic via an intermediary (proxy) server

23
Q

Symmetric encryption

A

Encryption which uses THE SAME KEY to encrypt and decrypt data

24
Q

Asymmetric encryption

A

Encryption which uses DIFFERENT KEYS (public and private) to encrypt and decrypt data