Protecting Data and Information Flashcards
Access Levels
Different levels of permissions that determine the actions a user can perform within a system or on specific data.
Access Rights
Permissions granted to users, specifying what actions they can perform on a computer system or specific files.
Accidental Damage
Unintentional harm or destruction to computer hardware, software, or data.
Accidental Loss
Unintended misplacement or deletion of data or files.
Anti-Virus Software
Programs designed to detect, prevent, and remove computer viruses and other malicious software.
Backup and Recovery Procedures
Plans and processes for regularly saving and restoring data to prevent loss in case of system failure or data corruption.
CAPTCHA
A security feature that requires users to complete a task to prove they are human and not a computer program.
Chip & PIN
A security feature for credit and debit cards that requires users to input a personal identification number (PIN) along with a chip in the card.
Contactless
A technology that enables transactions or data exchange by bringing devices close together without physical contact.
Cracking
Unauthorized attempts to bypass security measures, often associated with attempting to obtain passwords.
Data Controller
An entity or individual responsible for determining the purposes and means of processing personal data.
Data Integrity
The accuracy, consistency, and reliability of data throughout its lifecycle.
Data Security
Measures taken to protect data from unauthorized access, alteration, or destruction.
Data Subject
An individual to whom personal data relates.
Data User
An entity or individual that uses or processes data, often subject to data protection regulations.
Denial of Service Attack
An attempt to make a computer or network unavailable to its intended users by overwhelming it with traffic or requests.
Digital Certificate
A digital document that verifies the identity of a website or individual and facilitates secure communication.
Disaster Recovery Plan
Procedures and strategies to recover and resume operations in the event of a catastrophic event or data loss.
Encryption
The process of converting information into a code to prevent unauthorized access.
File Permissions
Settings that determine who can access or modify files on a computer system.