Security and Data Management Flashcards

1
Q

Suitable passwords

A

Different programs may require a user to use different
complexities of password, as well as different character lengths. An example of a simple
password may be the user’s town of birth, or the word ‘password’

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

User access levels

A

User access levels are one method used to allow certain users read and/or write
access to data on a computer system. For example, in a program used within a company, an
administrator, possibly the owner, will have read and write access to all data on the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Encryption techniques

A

Encryption is the conversion of data, using an algorithm, into a form, called cyphertext that
cannot be easily understood by people without the decryption key.
When data is encrypted, a logical operator is sometimes used, called the XOR logical
operator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly