Module 1.3 - Computer Management Flashcards
Encryption
The ‘scrambling’ of text or data to a specified set of rules to ensure the privacy of data during communication, or for security purposes.
Worm
Malware that is able to distribute itself over a network, normally via e-mail, without a person having run an infected program.
Malware
Malicious software installed without users’ knowledge and designed to negatively affect the operation of a computer system.
Firewall
Hardware and/or software that monitors the traffic between a computer and the Internet, to safeguard against breaches in security.
UPS
Uninterruptible Power Supply - is a large rechargeable battery. It maintains sufficient power to allow a server to keep running until it can shut down cleanly and safely. A UPS also smooths the power output coming from the mains to avoid power spikes which would likely damage a computer.
RAID
Redundant Array of Inexpensive/Independent Disks – the configuration of two or more hard drives to act as one large storage utility, designed to minimise the possibility of data loss - by storing the data across all of the Disks (Data Striping) and providing a redundant copy of the data (Mirroring).
GIGO
‘Garbage In, Garbage Out’; the quality of the output for any computer system is directly related to the quality of the input.
Spoofing
The substitution of email or web site addresses with false addresses in order to make a email or web site appear legitimate.
Rootkit
Collection of programs designed to use administrator rights to gain control of a computer for malicious purposes.
Virus
A computer virus is a malicious program that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves.
Incremental backup
Backup schedule whereby backups are made only of new files and flies that have changed since the last backup, allowing selective data recovery from an earlier date.
Phishing
Attempts from people, generally employing e-mail with links, to direct users to fake websites, where they are tricked into releasing personal information (e.g. passwords).
Pharming
When a hacker attempts to redirect your web traffic to a fake Web site that looks legitimate. The fake Web site requests you to enter confidential information.
Trojan
A from of malware disguised as a useful program, but in reality designed to do harm.
Spyware
A form of malware that tries to monitor and track the way you use your computer to discover confidential information, and then relay this to a third party.
Keyloggers are an example of Spyware.