Protecting Data and Information Flashcards
Access Levels
Different levels of permissions that determine the actions a user can perform within a system or on specific data.
Access Rights
Permissions granted to users, specifying what actions they can perform on a computer system or specific files.
Accidental Damage
Unintentional harm or destruction to computer hardware, software, or data.
Accidental Loss
Unintended misplacement or deletion of data or files.
Anti-Virus Software
Programs designed to detect, prevent, and remove computer viruses and other malicious software.
Backup and Recovery Procedures
Plans and processes for regularly saving and restoring data to prevent loss in case of system failure or data corruption.
CAPTCHA
A security feature that requires users to complete a task to prove they are human and not a computer program.
Chip & PIN
A security feature for credit and debit cards that requires users to input a personal identification number (PIN) along with a chip in the card.
Contactless
A technology that enables transactions or data exchange by bringing devices close together without physical contact.
Cracking
Unauthorized attempts to bypass security measures, often associated with attempting to obtain passwords.
Data Controller
An entity or individual responsible for determining the purposes and means of processing personal data.
Data Integrity
The accuracy, consistency, and reliability of data throughout its lifecycle.
Data Security
Measures taken to protect data from unauthorized access, alteration, or destruction.
Data Subject
An individual to whom personal data relates.
Data User
An entity or individual that uses or processes data, often subject to data protection regulations.
Denial of Service Attack
An attempt to make a computer or network unavailable to its intended users by overwhelming it with traffic or requests.
Digital Certificate
A digital document that verifies the identity of a website or individual and facilitates secure communication.
Disaster Recovery Plan
Procedures and strategies to recover and resume operations in the event of a catastrophic event or data loss.
Encryption
The process of converting information into a code to prevent unauthorized access.
File Permissions
Settings that determine who can access or modify files on a computer system.
Firewall
A security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Format Check
Verifying that data is in the correct format, preventing errors or inconsistencies.
General Data Protection Regulation (GDPR)
A set of regulations designed to protect the privacy and personal data of individuals in the European Union.
Hacking
Unauthorized access, manipulation, or exploitation of computer systems or networks.
Hashing
Converting data into a fixed-size string of characters, often used for data verification and security purposes.
Identity Fraud
Unauthorized use of someone else’s personal information for fraudulent purposes.
Information Commissioner’s Office (ICO)
The UK’s independent authority that upholds information rights and promotes data privacy.
Internet Bot
Automated software designed to perform tasks on the internet, both legitimate and malicious.
Length Check
Verifying that data meets specified length requirements, preventing errors or inconsistencies.
MAC Address
Media Access Control address, a unique identifier assigned to a network interface for communication.
Malware
Malicious software designed to harm or exploit computer systems or data.
Man in the Middle Attack
A security breach where an attacker intercepts and possibly alters the communication between two parties.
Name Generator Attack
A type of cyber attack that exploits automated processes using randomly generated names.
Passwords
Secret combinations of characters used to access computer systems or accounts.
Phishing
Attempting to deceive individuals into revealing sensitive information by pretending to be a trustworthy entity.
Physical Access Control
Measures to restrict physical access to computer systems or data storage areas.
Port
A communication endpoint in a computer network, allowing data to be sent and received.
Presence Check
Verifying that required data or fields are filled or present.
Private Key Encryption
Encryption method that uses a private key to encrypt and decrypt data, ensuring secure communication.
Protocol
A set of rules governing how data is transmitted between devices in a network.
Public Key Encryption
Encryption method that uses a pair of public and private keys for secure communication.
Quarantine
Isolating or containing potentially harmful files or software to prevent them from causing harm.
Range Check
Verifying that data falls within specified numerical ranges, preventing errors or inconsistencies.
Ransomware
Malicious software that encrypts a user’s files and demands payment for their release.
Real-Time Scanning
Continuous scanning for viruses or malware as files are accessed or modified in real-time.
Shouldering
Unauthorized individuals observing or obtaining sensitive information by looking over someone’s shoulder.
Spyware
Software designed to secretly collect information about a user’s activities without their knowledge.
Trojan
Malicious software disguised as legitimate software to deceive users into unknowingly installing it.
Type Check
Verifying that data is of the expected type, preventing errors or inconsistencies.
Virus Definition
A database of known virus characteristics used by antivirus software to detect and remove threats.
Viruses
Self-replicating and harmful software that infects other programs and can cause damage to computer systems.
Worm
A type of self-replicating malware that spreads across computer networks without user interaction.