Keywords 9 - Security Flashcards
Computer security
The protection of computers from unauthorised access and the protection of data from loss
Server
A computer that handles requests from other computers
Request
A communication that asks for data to be transferred
Physical security
Security which physically prevents access to a computer
Authentication
Security which prevents access to a computer even if the user has physical access
Anti-virus software
Software which finds and removes viruses from a computer by scanning it
Encryption
A method of modifying data to make it difficult to understand if intercepted
Key
Information that describes how a message is encrypted or decrypted
SSL (Secure Socket Layer)
A protocol (set of rules) that allows secure communication between computers
TLS (Transport Layer Security)
A recent, more secure version of SSL (Secure Socket Layer), which allows secure communication between computers
Malware
Software designed to disrupt or modify a computer system and its data
Virus
Self-replicating software that causes data loss by deleting or corrupting data
Worm
Self-replicating software that fills a computer’s memory, causing it to slow or stop
Trojan Horse
A program disguised as another program that works like a virus, deleting or corrupting data
Spyware
Software to collect personal and sensitive data and transmit this to the spyware’s authors
Phishing
Asking for data using an email that looks like it comes from a trusted source
Pharming
Using emails to trick a user into visiting a fake website and giving away personal or sensitive data
DoS attack (Denial of Service)
Preventing access to a server through sending a large number of requests from one computer at the same time, overwhelming the server
DDoS attack (Distributed Denial of Service)
Preventing access to a server through sending a large number of requests from many computers at the same time, overwhelming the server
Biometrics
Use of physical characteristics as a means of identification on a computer (e.g. eye or fingerprint recognition)
Firewall
A security technology (hardware or software) that monitoring incoming and outgoing traffic, blocking traffic as needed
Proxy server
Prevents direct access to a server by directing traffic via an intermediary (proxy) server
Symmetric encryption
Encryption which uses THE SAME KEY to encrypt and decrypt data
Asymmetric encryption
Encryption which uses DIFFERENT KEYS (public and private) to encrypt and decrypt data