6 security, privacy and data integrity Flashcards
(35 cards)
data privacy
privacy of personal information stored on a computer, that should not be accessed by unauthorized parties
data protection laws
laws which govern how data should be kept private and secure
data security
methods taken to prevent unauthorized access to data and to recover data if lost or corrupted
user account
authenticates user by using username and password, allowing an individual to use a computer or network server
authentication
way of proving somebody is who they claim to be
access rights
use of access levels to ensure only authorized users can gain access to certain data
malware
malicious software that wants to damage or gain unauthorized access to a computer system
firewall
software or hardware that sits between a computer and external network that monitors and filters all incoming and outgoing activities
- checks against allow list
- blocks transmissions that do not meet criteria
anti- spyware software
detects and removes spyware programs installed illegally on a users computer
encryption
data is turned into cipher text so it cannot be understood without decryption key
biometrics
use of unique human characteristics to identify a user (facial recognition, fingerprint) as part of the password system
anti virus software
-checks files before they are loaded
- compare possible viruses against a database of known viruses
- quarantine files which are possibly infected
hacking
illegal access to a computer system without the owners permission
malicious hacking
intention of deleting or corrupting files to gain personal detail
ethical hacking
authorized by company’s to check their security measures and how robust their computer systems are to resist hacking attacks
viruses
programs that can copy themselves with the intention of deleting or corrupting files causing the computer to malfunction
worms
type of standalone virus that can replicate itself with the intention of spreading to other computers
logic bombs
code embedded in a program on a computer. when certain conditions are met, they are activated such as deleting files or sending data to a hacker
trojan horses
malicious programs disguised as legitimate software with intent of carrying harm to users computer system
bots
not always harmful, can be used to search automatically for a system on the internet. can cause harm by launching attacks and taking control over computer system
spyware
software that gathers information by monitoring
phishing
legitimate looking emails designed to trick the recipient into giving their personal data to the sender
pharming
malicious code installed on a users computer. the code redirects the user to a fake website without their knowledge to gain personal data
dns cache poisoning
altering IP addresses on a DNS server by a pharmer or hacker with the intention of redirecting a user to their fake website without